Search criteria

61 vulnerabilities found for proftpd by proftpd_project

FKIE_CVE-2009-0542

Vulnerability from fkie_nvd - Published: 2009-02-12 16:30 - Updated: 2025-04-09 00:30
Severity ?
Summary
SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql.
References
cve@mitre.orghttp://bugs.proftpd.org/show_bug.cgi?id=3180
cve@mitre.orghttp://secunia.com/advisories/34268
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200903-27.xml
cve@mitre.orghttp://www.debian.org/security/2009/dsa-1730
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2009:061
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2009/02/11/1
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2009/02/11/3
cve@mitre.orghttp://www.openwall.com/lists/oss-security/2009/02/11/5
cve@mitre.orghttp://www.securityfocus.com/archive/1/500823/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/500833/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/500851/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/500852/100/0/threaded
cve@mitre.orghttps://www.exploit-db.com/exploits/8037
af854a3a-2127-422b-91ae-364da2661108http://bugs.proftpd.org/show_bug.cgi?id=3180
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/34268
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200903-27.xml
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2009/dsa-1730
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:061
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/02/11/1
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/02/11/3
af854a3a-2127-422b-91ae-364da2661108http://www.openwall.com/lists/oss-security/2009/02/11/5
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/500823/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/500833/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/500851/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/500852/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/8037
Impacted products
Vendor Product Version
proftpd_project proftpd 1.3.1
proftpd_project proftpd 1.3.2
proftpd_project proftpd 1.3.2_rc2

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "71965620-399A-450C-95A5-5B327438768A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.3.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A80BB64-A714-40D6-80E1-D4AAC5498289",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.3.2_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBCEA1CC-B662-4B36-8AC3-4C3A3CE3E54C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a \"%\" (percent) character in the username, which introduces a \"\u0027\" (single quote) character during variable substitution by mod_sql."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n SQL en el ProFTPD Server v1.3.1 hasta v1.3.2rc2, permite a atacantes remotos ejecutar comandos SQL de su elecci\u00f3n a trav\u00e9s de un car\u00e1cter \"%\" (porcentaje) en el nombre de usuario, esto introduce un car\u00e1cter \"\u0027\" (comilla simple) durante la sustituci\u00f3n de variable por mod_sql."
    }
  ],
  "id": "CVE-2009-0542",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2009-02-12T16:30:00.267",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.proftpd.org/show_bug.cgi?id=3180"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/34268"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200903-27.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2009/dsa-1730"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2009/02/11/1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2009/02/11/3"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openwall.com/lists/oss-security/2009/02/11/5"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/500823/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/500833/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/500851/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/500852/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/8037"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.proftpd.org/show_bug.cgi?id=3180"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/34268"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200903-27.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2009/dsa-1730"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/02/11/1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/02/11/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openwall.com/lists/oss-security/2009/02/11/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/500823/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/500833/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/500851/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/500852/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/8037"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-89"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2008-4242

Vulnerability from fkie_nvd - Published: 2008-09-25 19:25 - Updated: 2025-04-09 00:30
Severity ?
Summary
ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
References
cve@mitre.orghttp://bugs.proftpd.org/show_bug.cgi?id=3115
cve@mitre.orghttp://secunia.com/advisories/31930Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/33261
cve@mitre.orghttp://secunia.com/advisories/33413
cve@mitre.orghttp://securityreason.com/achievement_securityalert/56
cve@mitre.orghttp://securityreason.com/securityalert/4313
cve@mitre.orghttp://www.debian.org/security/2008/dsa-1689
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDVSA-2009:061
cve@mitre.orghttp://www.securityfocus.com/bid/31289Exploit
cve@mitre.orghttp://www.securitytracker.com/id?1020945
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/45274
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-January/msg00078.html
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2009-January/msg00245.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.proftpd.org/show_bug.cgi?id=3115
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/31930Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33261
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/33413
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/achievement_securityalert/56
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/4313
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2008/dsa-1689
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2009:061
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/31289Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1020945
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/45274
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00078.html
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00245.html
Impacted products
Vendor Product Version
proftpd_project proftpd 1.3.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "71965620-399A-450C-95A5-5B327438768A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser."
    },
    {
      "lang": "es",
      "value": "ProFTPD  v1.3.1 interpreta como m\u00faltiples comandos los comandos largos de un cliente FTP, lo que permite a atacantes remotos llevar a cabo ataques de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSFR) y ejecutar comdos FTP de su elecci\u00f3n a trav\u00e9s de una URI ftp:// larga que aprovecha la sesi\u00f3n existente en la implementaci\u00f3n de cliente FTP en un navegador web."
    }
  ],
  "id": "CVE-2008-4242",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-09-25T19:25:18.693",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.proftpd.org/show_bug.cgi?id=3115"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31930"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/33261"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/33413"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/achievement_securityalert/56"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/4313"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2008/dsa-1689"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/31289"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1020945"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45274"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00078.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00245.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.proftpd.org/show_bug.cgi?id=3115"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/31930"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33261"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/33413"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/achievement_securityalert/56"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/4313"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2008/dsa-1689"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/31289"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1020945"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45274"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00078.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00245.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-352"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2007-2165

Vulnerability from fkie_nvd - Published: 2007-04-22 19:19 - Updated: 2025-04-09 00:30
Severity ?
Summary
The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255Vendor Advisory
cve@mitre.orghttp://bugs.proftpd.org/show_bug.cgi?id=2922Patch
cve@mitre.orghttp://osvdb.org/34602
cve@mitre.orghttp://secunia.com/advisories/24867Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/25724
cve@mitre.orghttp://secunia.com/advisories/27516
cve@mitre.orghttp://securitytracker.com/id?1017931Vendor Advisory
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:130
cve@mitre.orghttp://www.securityfocus.com/bid/23546
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/1444
cve@mitre.orghttps://bugzilla.redhat.com/show_bug.cgi?id=237533
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/33733
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-November/msg00065.html
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://bugs.proftpd.org/show_bug.cgi?id=2922Patch
af854a3a-2127-422b-91ae-364da2661108http://osvdb.org/34602
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24867Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/25724
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/27516
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017931Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:130
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/23546
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/1444
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/show_bug.cgi?id=237533
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/33733
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00065.html
Impacted products
Vendor Product Version
proftpd_project proftpd *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B84D8596-CC91-4BE7-932D-EF6BDFD47561",
              "versionEndIncluding": "1.3.0_rc1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd."
    },
    {
      "lang": "es",
      "value": "El API en ProFTPD anterior 20070417, cuando \t\r\nse configuran m\u00faltiples m\u00f3dulos de validaci\u00f3n de forma simultanea, no requiere que el m\u00f3dulo que valida la autenticaci\u00f3n en el mismo m\u00f3dulo que recupera los datos de validaci\u00f3n, lo cual podr\u00eda permitir a atacantes remotos evitar la validaci\u00f3n, como se demostr\u00f3 con el uso SQLAuthTypes Plaintext en mod_sql, con datos recuperados de /etc/passwd."
    }
  ],
  "id": "CVE-2007-2165",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-04-22T19:19:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.proftpd.org/show_bug.cgi?id=2922"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/34602"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24867"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/25724"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/27516"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1017931"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:130"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/23546"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/1444"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237533"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33733"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00065.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.proftpd.org/show_bug.cgi?id=2922"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/34602"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/24867"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/25724"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/27516"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://securitytracker.com/id?1017931"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:130"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/23546"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/1444"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33733"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00065.html"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-6563

Vulnerability from fkie_nvd - Published: 2006-12-15 11:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
References
cve@mitre.orghttp://secunia.com/advisories/23371Exploit, Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23392
cve@mitre.orghttp://secunia.com/advisories/23473
cve@mitre.orghttp://secunia.com/advisories/24163
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200702-02.xml
cve@mitre.orghttp://www.coresecurity.com/?module=ContentMod&action=item&id=1594Exploit, Patch
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:232
cve@mitre.orghttp://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html
cve@mitre.orghttp://www.proftpd.org/docs/NEWS-1.3.1rc1
cve@mitre.orghttp://www.securityfocus.com/archive/1/454320/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/460648/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/460756/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/21587Exploit, Patch
cve@mitre.orghttp://www.trustix.org/errata/2006/0074/
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/4998
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/30906
cve@mitre.orghttps://www.exploit-db.com/exploits/3330
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23371Exploit, Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23392
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23473
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/24163
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200702-02.xml
af854a3a-2127-422b-91ae-364da2661108http://www.coresecurity.com/?module=ContentMod&action=item&id=1594Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:232
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html
af854a3a-2127-422b-91ae-364da2661108http://www.proftpd.org/docs/NEWS-1.3.1rc1
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/454320/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/460648/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/460756/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/21587Exploit, Patch
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0074/
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4998
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/30906
af854a3a-2127-422b-91ae-364da2661108https://www.exploit-db.com/exploits/3330
Impacted products
Vendor Product Version
proftpd_project proftpd 1.3.0
proftpd_project proftpd 1.3.0a

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "0145065F-44D0-4E1F-AA2B-1A1B2550E2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.3.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "73C76602-73FC-4273-9A46-E4B1DDAA5A23",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n pr_ctrls_recv_request en ctrls.c en el m\u00f3dulo mod_ctrls en ProFTPD anterior a 1.3.1rc1 permite a un usuario local ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s del valor de longitud reqarglen."
    }
  ],
  "evaluatorSolution": "This vulnerability is addressed in the following product update:\r\nProFTPD Project, ProFTPD, 1.3.1rc1",
  "id": "CVE-2006-6563",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "SINGLE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.6,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 2.7,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-12-15T11:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23371"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23392"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23473"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/24163"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200702-02.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.coresecurity.com/?module=ContentMod\u0026action=item\u0026id=1594"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:232"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.proftpd.org/docs/NEWS-1.3.1rc1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/454320/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/460648/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/460756/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/21587"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2006/0074/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/4998"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30906"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.exploit-db.com/exploits/3330"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23371"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23392"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23473"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/24163"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200702-02.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.coresecurity.com/?module=ContentMod\u0026action=item\u0026id=1594"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:232"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.proftpd.org/docs/NEWS-1.3.1rc1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/454320/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/460648/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/460756/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/21587"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0074/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4998"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30906"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.exploit-db.com/exploits/3330"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-6171

Vulnerability from fkie_nvd - Published: 2006-11-30 15:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure. NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability
References
cve@mitre.orghttp://proftp.cvs.sourceforge.net/proftp/proftpd/src/main.c?r1=1.292&r2=1.293&sortby=dateVendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23174
cve@mitre.orghttp://secunia.com/advisories/23179
cve@mitre.orghttp://secunia.com/advisories/23184
cve@mitre.orghttp://secunia.com/advisories/23207
cve@mitre.orghttp://secunia.com/advisories/23329
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1218
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1222
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200611-26.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1
cve@mitre.orghttp://www.openpkg.com/security/advisories/OpenPKG-SA-2006.035.html
cve@mitre.orghttp://www.trustix.org/errata/2006/0070
cve@mitre.orghttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://proftp.cvs.sourceforge.net/proftp/proftpd/src/main.c?r1=1.292&r2=1.293&sortby=dateVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23174
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23179
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23184
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23207
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23329
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1218
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1222
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.035.html
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0070
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820Vendor Advisory
Impacted products
Vendor Product Version
proftpd_project proftpd *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "743C1E0F-3365-49C0-99A3-628586B77FCC",
              "versionEndIncluding": "1.3.0a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [
    {
      "sourceIdentifier": "cve@mitre.org",
      "tags": [
        "disputed"
      ]
    }
  ],
  "descriptions": [
    {
      "lang": "en",
      "value": "ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow.  NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure.  NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability"
    },
    {
      "lang": "es",
      "value": "** IMPUGNADO ** ProFTPD 1.3.0a y versiones anteriores no asigna apropiadamente el l\u00edmite del b\u00fafer cuando se especifica CommandBufferSize en el fichero de configuraci\u00f3n, lo que conduce a un desbordamiento inferior de b\u00fafer por superaci\u00f3n de l\u00edmite (off-by-twho).\r\nNOTA: En Noviembre de 2006, el rol de CommandBufferSize fue originalmente asociado con CVE-2006-5815, lo cual fue erroneo debido a un vago descubrimiento inicial.\r\nNOTA: Los desarrolladores de ProFTPD impugnaron esta vulnerabilidad, diciendo que la ubicaci\u00f3n de memoria es sobre-escrita por asignaci\u00f3n antes de ser usada con la funci\u00f3n afectada, as\u00ed que no es una vulnerabilidad."
    }
  ],
  "id": "CVE-2006-6171",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-11-30T15:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://proftp.cvs.sourceforge.net/proftp/proftpd/src/main.c?r1=1.292\u0026r2=1.293\u0026sortby=date"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23174"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23179"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23184"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23207"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23329"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1218"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.035.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2006/0070"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://proftp.cvs.sourceforge.net/proftp/proftpd/src/main.c?r1=1.292\u0026r2=1.293\u0026sortby=date"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23174"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23207"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23329"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1218"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.035.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0070"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-6170

Vulnerability from fkie_nvd - Published: 2006-11-30 15:28 - Updated: 2025-04-09 00:30
Severity ?
Summary
Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.
References
cve@mitre.orghttp://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.htmlExploit, Vendor Advisory
cve@mitre.orghttp://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.htmlExploit, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23141Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23174
cve@mitre.orghttp://secunia.com/advisories/23179
cve@mitre.orghttp://secunia.com/advisories/23184
cve@mitre.orghttp://secunia.com/advisories/23207
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1222
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200611-26.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1
cve@mitre.orghttp://www.securityfocus.com/archive/1/452228/100/100/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/452872/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/452993/100/100/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/21326
cve@mitre.orghttp://www.trustix.org/errata/2006/0066
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/4745
cve@mitre.orghttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820Vendor Advisory
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/30554
af854a3a-2127-422b-91ae-364da2661108http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.htmlExploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.htmlExploit, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23141Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23174
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23179
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23184
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23207
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1222
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/452228/100/100/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/452872/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/452993/100/100/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/21326
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0066
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4745
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/30554
Impacted products
Vendor Product Version
proftpd_project proftpd *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "743C1E0F-3365-49C0-99A3-628586B77FCC",
              "versionEndIncluding": "1.3.0a",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815."
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer en la funci\u00f3n tls_x509_name_oneline en el m\u00f3dulo mod_tls, tal y como se usa en ProFTPD 1.3.0a y versiones anteriores, y posiblemente otros productos, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un argumento con datos de gran longitud.\r\nVulnerabilidad distinta a CVE-2006-5815."
    }
  ],
  "id": "CVE-2006-6170",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-11-30T15:28:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23141"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23174"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23179"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23184"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/23207"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/452228/100/100/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/452872/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/452993/100/100/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/21326"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2006/0066"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/4745"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30554"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit",
        "Vendor Advisory"
      ],
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23141"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23174"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/23207"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/452228/100/100/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/452872/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/452993/100/100/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/21326"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0066"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/4745"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30554"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-5815

Vulnerability from fkie_nvd - Published: 2006-11-08 23:07 - Updated: 2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
References
cve@mitre.orghttp://bugs.proftpd.org/show_bug.cgi?id=2858
cve@mitre.orghttp://gleg.net/vulndisco_meta.shtml
cve@mitre.orghttp://secunia.com/advisories/22803Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/22821Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23000Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23069Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23125Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23174Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23179Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23184Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/23207Vendor Advisory
cve@mitre.orghttp://securitytracker.com/id?1017167
cve@mitre.orghttp://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1222
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200611-26.xml
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:217
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1
cve@mitre.orghttp://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/452760/100/200/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/20992
cve@mitre.orghttp://www.trustix.org/errata/2006/0066/
cve@mitre.orghttp://www.trustix.org/errata/2006/0070
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/4451Vendor Advisory
cve@mitre.orghttps://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/30147
af854a3a-2127-422b-91ae-364da2661108http://bugs.proftpd.org/show_bug.cgi?id=2858
af854a3a-2127-422b-91ae-364da2661108http://gleg.net/vulndisco_meta.shtml
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22803Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/22821Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23000Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23069Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23125Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23174Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23179Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23184Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/23207Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1017167
af854a3a-2127-422b-91ae-364da2661108http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.502491
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1222
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:217
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1
af854a3a-2127-422b-91ae-364da2661108http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/452760/100/200/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/20992
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0066/
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2006/0070
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/4451Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/30147
Impacted products
Vendor Product Version
proftpd_project proftpd *

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "70984BA9-2E11-4463-81AF-DF7F663F8258",
              "versionEndIncluding": "1.3.0",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a \"ProFTPD remote exploit.\""
    },
    {
      "lang": "es",
      "value": "Desbordamiento de b\u00fafer basado en pila en la funci\u00f3n sreplace en ProFTPD 1.3.0 y anteriores permite a atacantes remotos, probablemente autentificados, provocar denegaci\u00f3n de servicio y ejecutar c\u00f3digo de su elecci\u00f3n, como se demostr\u00f3 con vd_proftpd.pm, un \"exploit remoto ProFTPD\"."
    }
  ],
  "evaluatorComment": "An off-by-one string manipulation flaw in ProFTPD\u0027s sreplace() function exists allowing a remote attacker to execute arbitrary code.\r\n",
  "id": "CVE-2006-5815",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-11-08T23:07:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.proftpd.org/show_bug.cgi?id=2858"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://gleg.net/vulndisco_meta.shtml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22803"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22821"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23000"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23069"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23125"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23174"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23179"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23184"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23207"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1017167"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1222"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/452760/100/200/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/20992"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2006/0066/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2006/0070"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4451"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30147"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.proftpd.org/show_bug.cgi?id=2858"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://gleg.net/vulndisco_meta.shtml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22803"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/22821"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23000"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23069"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23125"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23174"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23179"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23184"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/23207"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1017167"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1222"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/452760/100/200/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/20992"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0066/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2006/0070"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/4451"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30147"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4816

Vulnerability from fkie_nvd - Published: 2005-12-31 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE2243B4-8E0C-46BC-A003-EF52C30A030E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3704E3B8-C1CE-442F-B69D-0ED9EDAD5D2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE12C338-EE8E-4E28-8E18-9C4FCC9D063D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E7C8D7-5F57-4B49-B404-DB4DAE273926",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BBF8B2-02E6-4A53-A5FC-DA8D39171753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9280692-0AB9-4C1F-804C-CB088E5E4483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.2_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F108D73C-1107-41DE-9DDB-505ABAF6E34D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.2_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34D3C65A-3EE0-4BF1-AB0E-E5D4B01DED2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8488C93D-2826-47BE-AE6D-A523199BA7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD18DE8B-E0E2-43DA-A365-FCCAED59A623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3591365-5973-450F-A3F5-2EA0247A9571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.5_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FFCBDF-B1A2-4B93-A2ED-83EA4FE52E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F8C767-468C-448B-8CA8-9DCD43A4BD8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D12FAE-5839-4123-876E-0A32DA2B1A42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.7_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D8C629A-5D13-4DE2-A866-DC99C8D0A761",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.7_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A879A73-C624-4D47-A748-9EAC73EC8DBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.7_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "53CC91C6-C680-469E-A103-691FAA1CF344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11D565E-0A90-4093-AA87-34A6DAE68E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.8_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B4A0D9-071F-4F0E-9826-054D5651773C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.8_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "918684E1-D1B5-48C6-B413-2FE86379EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C1A60B-D79B-4EE3-9E48-83AF875AD062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.9_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9C5CBBA-43CE-4D77-9DA4-D4C4E010978B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.9_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "89CD92BA-407E-4089-A98F-6D1309D8C294",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.9_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3EA91F4-AC66-4A9E-B3B0-AB9B52257DCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DB59FBA-AD15-453A-A3CA-7673D005920C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2_pre1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE1015CB-9A33-48D5-861A-A1FC0D8D0FA6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2_pre2:*:*:*:*:*:*:*",
              "matchCriteriaId": "66C825FE-91EC-43A2-9EEA-65A31DF46570",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2_pre3:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C563389-39DB-45BA-9C84-DD6837900440",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2_pre4:*:*:*:*:*:*:*",
              "matchCriteriaId": "E2ABE74B-3D17-45D9-A87A-CE562DDB4454",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2_pre5:*:*:*:*:*:*:*",
              "matchCriteriaId": "9166C42C-340D-4E7E-915C-BC2E4A373ACE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2_pre6:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C586B4-670E-448B-8DFD-EE08F530BC3D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2_pre7:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9AED91C-8428-40F0-9E47-FF3FE7CAB067",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2_pre8:*:*:*:*:*:*:*",
              "matchCriteriaId": "114C3C5D-B227-4DE7-8485-1AE4B5E5E232",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2_pre9:*:*:*:*:*:*:*",
              "matchCriteriaId": "0825C72A-DF19-44E4-9DCF-7F7047C1C582",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2_pre10:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB8D658A-726D-4CB2-A07B-287A8EB3CB9A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2_pre11:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3ED09E8-2852-464B-9721-340F8F8C3B2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.3.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DAED483-3825-493E-978D-9047A1F7087B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password."
    }
  ],
  "id": "CVE-2005-4816",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://archives.neohapsis.com/archives/dailydave/2006-q1/0122.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://bugs.proftpd.org/show_bug.cgi?id=2658"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1245"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/23063"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/16535"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://archives.neohapsis.com/archives/dailydave/2006-q1/0122.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.proftpd.org/show_bug.cgi?id=2658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1245"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/23063"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/16535"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-2390

Vulnerability from fkie_nvd - Published: 2005-07-27 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.0_pre9:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D0097C-ED4C-407B-B363-AFE6BE547199",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.0_pre10:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFA7079C-7203-4018-B39C-4BE7B13B5EBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3704E3B8-C1CE-442F-B69D-0ED9EDAD5D2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.0_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE12C338-EE8E-4E28-8E18-9C4FCC9D063D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.0_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "33E7C8D7-5F57-4B49-B404-DB4DAE273926",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8BBF8B2-02E6-4A53-A5FC-DA8D39171753",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.1_final:*:*:*:*:*:*:*",
              "matchCriteriaId": "79330B03-B812-435F-A210-6844CC93C71F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9280692-0AB9-4C1F-804C-CB088E5E4483",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.2_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F108D73C-1107-41DE-9DDB-505ABAF6E34D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.2_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD7D3BDE-2200-4A5A-B149-DF4D52145A04",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.2_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "34D3C65A-3EE0-4BF1-AB0E-E5D4B01DED2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8488C93D-2826-47BE-AE6D-A523199BA7D8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD18DE8B-E0E2-43DA-A365-FCCAED59A623",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3591365-5973-450F-A3F5-2EA0247A9571",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.5_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "85FFCBDF-B1A2-4B93-A2ED-83EA4FE52E1B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.5_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15715C4-0E91-4D9C-96E0-4CB49150F0F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.5_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "25B126A9-3501-4FB2-8AE7-054A6061BE9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F8C767-468C-448B-8CA8-9DCD43A4BD8A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.6_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "58E52D66-5252-42D5-8226-E73523FD5DE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.6_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "8C706764-D081-4CA1-BBD3-0BEFABAD6BC2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.6_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "0B1D7983-887E-48D7-B264-7EE349019C73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "31D12FAE-5839-4123-876E-0A32DA2B1A42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.7_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0D8C629A-5D13-4DE2-A866-DC99C8D0A761",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.7_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A879A73-C624-4D47-A748-9EAC73EC8DBD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.7_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "53CC91C6-C680-469E-A103-691FAA1CF344",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "C11D565E-0A90-4093-AA87-34A6DAE68E88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.8_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8B4A0D9-071F-4F0E-9826-054D5651773C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.8_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "918684E1-D1B5-48C6-B413-2FE86379EFF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C1A60B-D79B-4EE3-9E48-83AF875AD062",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.9_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9C5CBBA-43CE-4D77-9DA4-D4C4E010978B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.9_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "89CD92BA-407E-4089-A98F-6D1309D8C294",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.9_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3EA91F4-AC66-4A9E-B3B0-AB9B52257DCF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "0DB59FBA-AD15-453A-A3CA-7673D005920C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.10_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7A35BC8A-C406-424A-B90B-2B7810380D53",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.10_rc2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9E9A40C-65E4-4AD8-9FDF-F91F06BF0FB7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.2.10_rc3:*:*:*:*:*:*:*",
              "matchCriteriaId": "80FDA09D-2CD7-4E98-8BD0-39D3F015144C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:proftpd_project:proftpd:1.3.0_rc1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DAED483-3825-493E-978D-9047A1F7087B",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples vulnerabilidades de formateo de cadenas en ProFTPD anterior a la 1..3.0rc2 permite que atacantes causen una denegaci\u00f3n de servicio u obtengan informaci\u00f3n confidencial mediante: 1) ciertos inputs al mensaje de apagado de ftpshut o 2) la directiva SQLShowInfo mod_sql"
    }
  ],
  "id": "CVE-2005-2390",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 6.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2005-07-27T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=112604373503912\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16181"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2005/dsa-795"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14380"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/14381"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=112604373503912\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/16181"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2005/dsa-795"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14380"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/14381"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2009-0542 (GCVE-0-2009-0542)

Vulnerability from cvelistv5 – Published: 2009-02-12 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2009/dsa-1730 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/archive/1/500833/100… mailing-listx_refsource_BUGTRAQ
http://www.openwall.com/lists/oss-security/2009/02/11/5 mailing-listx_refsource_MLIST
http://bugs.proftpd.org/show_bug.cgi?id=3180 x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2009/02/11/3 mailing-listx_refsource_MLIST
http://secunia.com/advisories/34268 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/500852/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/500851/100… mailing-listx_refsource_BUGTRAQ
http://www.openwall.com/lists/oss-security/2009/02/11/1 mailing-listx_refsource_MLIST
http://security.gentoo.org/glsa/glsa-200903-27.xml vendor-advisoryx_refsource_GENTOO
https://www.exploit-db.com/exploits/8037 exploitx_refsource_EXPLOIT-DB
http://www.securityfocus.com/archive/1/500823/100… mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:04.250Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-1730",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1730"
          },
          {
            "name": "20090210 Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/500833/100/0/threaded"
          },
          {
            "name": "[oss-security] 20090211 Re: CVE request for proftpd",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/02/11/5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.proftpd.org/show_bug.cgi?id=3180"
          },
          {
            "name": "[oss-security] 20090211 Re: CVE request for proftpd",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/02/11/3"
          },
          {
            "name": "34268",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34268"
          },
          {
            "name": "MDVSA-2009:061",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
          },
          {
            "name": "20090211 Re: Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/500852/100/0/threaded"
          },
          {
            "name": "20090210 ProFTPd with mod_mysql Authentication Bypass Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/500851/100/0/threaded"
          },
          {
            "name": "[oss-security] 20090211 CVE request for proftpd",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/02/11/1"
          },
          {
            "name": "GLSA-200903-27",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200903-27.xml"
          },
          {
            "name": "8037",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8037"
          },
          {
            "name": "20090210 Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/500823/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a \"%\" (percent) character in the username, which introduces a \"\u0027\" (single quote) character during variable substitution by mod_sql."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-1730",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1730"
        },
        {
          "name": "20090210 Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/500833/100/0/threaded"
        },
        {
          "name": "[oss-security] 20090211 Re: CVE request for proftpd",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/02/11/5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.proftpd.org/show_bug.cgi?id=3180"
        },
        {
          "name": "[oss-security] 20090211 Re: CVE request for proftpd",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/02/11/3"
        },
        {
          "name": "34268",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34268"
        },
        {
          "name": "MDVSA-2009:061",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
        },
        {
          "name": "20090211 Re: Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/500852/100/0/threaded"
        },
        {
          "name": "20090210 ProFTPd with mod_mysql Authentication Bypass Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/500851/100/0/threaded"
        },
        {
          "name": "[oss-security] 20090211 CVE request for proftpd",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/02/11/1"
        },
        {
          "name": "GLSA-200903-27",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200903-27.xml"
        },
        {
          "name": "8037",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8037"
        },
        {
          "name": "20090210 Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/500823/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0542",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a \"%\" (percent) character in the username, which introduces a \"\u0027\" (single quote) character during variable substitution by mod_sql."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-1730",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1730"
            },
            {
              "name": "20090210 Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/500833/100/0/threaded"
            },
            {
              "name": "[oss-security] 20090211 Re: CVE request for proftpd",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/02/11/5"
            },
            {
              "name": "http://bugs.proftpd.org/show_bug.cgi?id=3180",
              "refsource": "CONFIRM",
              "url": "http://bugs.proftpd.org/show_bug.cgi?id=3180"
            },
            {
              "name": "[oss-security] 20090211 Re: CVE request for proftpd",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/02/11/3"
            },
            {
              "name": "34268",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34268"
            },
            {
              "name": "MDVSA-2009:061",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
            },
            {
              "name": "20090211 Re: Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/500852/100/0/threaded"
            },
            {
              "name": "20090210 ProFTPd with mod_mysql Authentication Bypass Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/500851/100/0/threaded"
            },
            {
              "name": "[oss-security] 20090211 CVE request for proftpd",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/02/11/1"
            },
            {
              "name": "GLSA-200903-27",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200903-27.xml"
            },
            {
              "name": "8037",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8037"
            },
            {
              "name": "20090210 Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/500823/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0542",
    "datePublished": "2009-02-12T16:00:00",
    "dateReserved": "2009-02-12T00:00:00",
    "dateUpdated": "2024-08-07T04:40:04.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-4242 (GCVE-0-2008-4242)

Vulnerability from cvelistv5 – Published: 2008-09-25 19:00 – Updated: 2024-08-07 10:08
VLAI?
Summary
ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/31289 vdb-entryx_refsource_BID
http://securityreason.com/achievement_securityalert/56 third-party-advisoryx_refsource_SREASONRES
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securitytracker.com/id?1020945 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/31930 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/33261 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/33413 third-party-advisoryx_refsource_SECUNIA
http://securityreason.com/securityalert/4313 third-party-advisoryx_refsource_SREASON
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.debian.org/security/2008/dsa-1689 vendor-advisoryx_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://bugs.proftpd.org/show_bug.cgi?id=3115 x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:08:34.954Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "31289",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31289"
          },
          {
            "name": "20080926 multiple vendor ftpd - Cross-site request forgery",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASONRES",
              "x_transferred"
            ],
            "url": "http://securityreason.com/achievement_securityalert/56"
          },
          {
            "name": "MDVSA-2009:061",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
          },
          {
            "name": "1020945",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020945"
          },
          {
            "name": "31930",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31930"
          },
          {
            "name": "FEDORA-2009-0195",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00245.html"
          },
          {
            "name": "33261",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33261"
          },
          {
            "name": "33413",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33413"
          },
          {
            "name": "4313",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4313"
          },
          {
            "name": "FEDORA-2009-0064",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00078.html"
          },
          {
            "name": "DSA-1689",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1689"
          },
          {
            "name": "proftpd-url-csrf(45274)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45274"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.proftpd.org/show_bug.cgi?id=3115"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-09-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "31289",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31289"
        },
        {
          "name": "20080926 multiple vendor ftpd - Cross-site request forgery",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASONRES"
          ],
          "url": "http://securityreason.com/achievement_securityalert/56"
        },
        {
          "name": "MDVSA-2009:061",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
        },
        {
          "name": "1020945",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020945"
        },
        {
          "name": "31930",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31930"
        },
        {
          "name": "FEDORA-2009-0195",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00245.html"
        },
        {
          "name": "33261",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33261"
        },
        {
          "name": "33413",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33413"
        },
        {
          "name": "4313",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4313"
        },
        {
          "name": "FEDORA-2009-0064",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00078.html"
        },
        {
          "name": "DSA-1689",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1689"
        },
        {
          "name": "proftpd-url-csrf(45274)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45274"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.proftpd.org/show_bug.cgi?id=3115"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4242",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "31289",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31289"
            },
            {
              "name": "20080926 multiple vendor ftpd - Cross-site request forgery",
              "refsource": "SREASONRES",
              "url": "http://securityreason.com/achievement_securityalert/56"
            },
            {
              "name": "MDVSA-2009:061",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
            },
            {
              "name": "1020945",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020945"
            },
            {
              "name": "31930",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31930"
            },
            {
              "name": "FEDORA-2009-0195",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00245.html"
            },
            {
              "name": "33261",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33261"
            },
            {
              "name": "33413",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33413"
            },
            {
              "name": "4313",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4313"
            },
            {
              "name": "FEDORA-2009-0064",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00078.html"
            },
            {
              "name": "DSA-1689",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1689"
            },
            {
              "name": "proftpd-url-csrf(45274)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45274"
            },
            {
              "name": "http://bugs.proftpd.org/show_bug.cgi?id=3115",
              "refsource": "CONFIRM",
              "url": "http://bugs.proftpd.org/show_bug.cgi?id=3115"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4242",
    "datePublished": "2008-09-25T19:00:00",
    "dateReserved": "2008-09-25T00:00:00",
    "dateUpdated": "2024-08-07T10:08:34.954Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-2165 (GCVE-0-2007-2165)

Vulnerability from cvelistv5 – Published: 2007-04-22 19:00 – Updated: 2024-08-07 13:23
VLAI?
Summary
The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255 x_refsource_MISC
http://bugs.proftpd.org/show_bug.cgi?id=2922 x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=237533 x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://secunia.com/advisories/25724 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/23546 vdb-entryx_refsource_BID
http://secunia.com/advisories/24867 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/34602 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2007/1444 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1017931 vdb-entryx_refsource_SECTRACK
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/27516 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:23:50.950Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.proftpd.org/show_bug.cgi?id=2922"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237533"
          },
          {
            "name": "MDKSA-2007:130",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:130"
          },
          {
            "name": "25724",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25724"
          },
          {
            "name": "23546",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23546"
          },
          {
            "name": "24867",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24867"
          },
          {
            "name": "34602",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/34602"
          },
          {
            "name": "ADV-2007-1444",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1444"
          },
          {
            "name": "1017931",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017931"
          },
          {
            "name": "FEDORA-2007-2613",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00065.html"
          },
          {
            "name": "27516",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27516"
          },
          {
            "name": "proftpd-authapi-security-bypass(33733)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33733"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.proftpd.org/show_bug.cgi?id=2922"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237533"
        },
        {
          "name": "MDKSA-2007:130",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:130"
        },
        {
          "name": "25724",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25724"
        },
        {
          "name": "23546",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23546"
        },
        {
          "name": "24867",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24867"
        },
        {
          "name": "34602",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/34602"
        },
        {
          "name": "ADV-2007-1444",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1444"
        },
        {
          "name": "1017931",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017931"
        },
        {
          "name": "FEDORA-2007-2613",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00065.html"
        },
        {
          "name": "27516",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27516"
        },
        {
          "name": "proftpd-authapi-security-bypass(33733)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33733"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2165",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255",
              "refsource": "MISC",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255"
            },
            {
              "name": "http://bugs.proftpd.org/show_bug.cgi?id=2922",
              "refsource": "CONFIRM",
              "url": "http://bugs.proftpd.org/show_bug.cgi?id=2922"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=237533",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237533"
            },
            {
              "name": "MDKSA-2007:130",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:130"
            },
            {
              "name": "25724",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25724"
            },
            {
              "name": "23546",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23546"
            },
            {
              "name": "24867",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24867"
            },
            {
              "name": "34602",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/34602"
            },
            {
              "name": "ADV-2007-1444",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1444"
            },
            {
              "name": "1017931",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017931"
            },
            {
              "name": "FEDORA-2007-2613",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00065.html"
            },
            {
              "name": "27516",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27516"
            },
            {
              "name": "proftpd-authapi-security-bypass(33733)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33733"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2165",
    "datePublished": "2007-04-22T19:00:00",
    "dateReserved": "2007-04-22T00:00:00",
    "dateUpdated": "2024-08-07T13:23:50.950Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4816 (GCVE-0-2005-4816)

Vulnerability from cvelistv5 – Published: 2006-12-23 11:00 – Updated: 2024-08-08 00:01
VLAI?
Summary
Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://archives.neohapsis.com/archives/dailydave/… mailing-listx_refsource_MLIST
http://bugs.proftpd.org/show_bug.cgi?id=2658 x_refsource_CONFIRM
http://www.securityfocus.com/bid/16535 vdb-entryx_refsource_BID
http://www.debian.org/security/2007/dsa-1245 vendor-advisoryx_refsource_DEBIAN
http://www.osvdb.org/23063 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:01:23.301Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[Dailydave] 20060207 ProFTPD bug",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/dailydave/2006-q1/0122.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.proftpd.org/show_bug.cgi?id=2658"
          },
          {
            "name": "16535",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16535"
          },
          {
            "name": "DSA-1245",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1245"
          },
          {
            "name": "23063",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23063"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-07-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-06-09T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[Dailydave] 20060207 ProFTPD bug",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://archives.neohapsis.com/archives/dailydave/2006-q1/0122.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.proftpd.org/show_bug.cgi?id=2658"
        },
        {
          "name": "16535",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16535"
        },
        {
          "name": "DSA-1245",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1245"
        },
        {
          "name": "23063",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23063"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4816",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[Dailydave] 20060207 ProFTPD bug",
              "refsource": "MLIST",
              "url": "http://archives.neohapsis.com/archives/dailydave/2006-q1/0122.html"
            },
            {
              "name": "http://bugs.proftpd.org/show_bug.cgi?id=2658",
              "refsource": "CONFIRM",
              "url": "http://bugs.proftpd.org/show_bug.cgi?id=2658"
            },
            {
              "name": "16535",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16535"
            },
            {
              "name": "DSA-1245",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1245"
            },
            {
              "name": "23063",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23063"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4816",
    "datePublished": "2006-12-23T11:00:00",
    "dateReserved": "2006-12-22T00:00:00",
    "dateUpdated": "2024-08-08T00:01:23.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6563 (GCVE-0-2006-6563)

Vulnerability from cvelistv5 – Published: 2006-12-15 11:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/21587 vdb-entryx_refsource_BID
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/454320/100… mailing-listx_refsource_BUGTRAQ
http://www.proftpd.org/docs/NEWS-1.3.1rc1 x_refsource_CONFIRM
http://www.coresecurity.com/?module=ContentMod&ac… x_refsource_MISC
http://www.securityfocus.com/archive/1/460648/100… mailing-listx_refsource_BUGTRAQ
http://www.openpkg.com/security/advisories/OpenPK… vendor-advisoryx_refsource_OPENPKG
https://www.exploit-db.com/exploits/3330 exploitx_refsource_EXPLOIT-DB
http://secunia.com/advisories/24163 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23473 third-party-advisoryx_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200702-02.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/23371 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4998 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/23392 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/460756/100… mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.trustix.org/errata/2006/0074/ vendor-advisoryx_refsource_TRUSTIX
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:33:59.205Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "21587",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21587"
          },
          {
            "name": "MDKSA-2006:232",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:232"
          },
          {
            "name": "20061213 CORE-2006-1127: ProFTPD Controls Buffer Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/454320/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.proftpd.org/docs/NEWS-1.3.1rc1"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.coresecurity.com/?module=ContentMod\u0026action=item\u0026id=1594"
          },
          {
            "name": "20070219 ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/460648/100/0/threaded"
          },
          {
            "name": "OpenPKG-SA-2006.039",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html"
          },
          {
            "name": "3330",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/3330"
          },
          {
            "name": "24163",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24163"
          },
          {
            "name": "23473",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23473"
          },
          {
            "name": "GLSA-200702-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200702-02.xml"
          },
          {
            "name": "23371",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23371"
          },
          {
            "name": "ADV-2006-4998",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4998"
          },
          {
            "name": "23392",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23392"
          },
          {
            "name": "20070221 Re: ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/460756/100/0/threaded"
          },
          {
            "name": "proftpd-controls-bo(30906)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30906"
          },
          {
            "name": "2006-0074",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0074/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "21587",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21587"
        },
        {
          "name": "MDKSA-2006:232",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:232"
        },
        {
          "name": "20061213 CORE-2006-1127: ProFTPD Controls Buffer Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/454320/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.proftpd.org/docs/NEWS-1.3.1rc1"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.coresecurity.com/?module=ContentMod\u0026action=item\u0026id=1594"
        },
        {
          "name": "20070219 ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/460648/100/0/threaded"
        },
        {
          "name": "OpenPKG-SA-2006.039",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html"
        },
        {
          "name": "3330",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/3330"
        },
        {
          "name": "24163",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24163"
        },
        {
          "name": "23473",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23473"
        },
        {
          "name": "GLSA-200702-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200702-02.xml"
        },
        {
          "name": "23371",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23371"
        },
        {
          "name": "ADV-2006-4998",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4998"
        },
        {
          "name": "23392",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23392"
        },
        {
          "name": "20070221 Re: ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/460756/100/0/threaded"
        },
        {
          "name": "proftpd-controls-bo(30906)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30906"
        },
        {
          "name": "2006-0074",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0074/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6563",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "21587",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21587"
            },
            {
              "name": "MDKSA-2006:232",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:232"
            },
            {
              "name": "20061213 CORE-2006-1127: ProFTPD Controls Buffer Overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/454320/100/0/threaded"
            },
            {
              "name": "http://www.proftpd.org/docs/NEWS-1.3.1rc1",
              "refsource": "CONFIRM",
              "url": "http://www.proftpd.org/docs/NEWS-1.3.1rc1"
            },
            {
              "name": "http://www.coresecurity.com/?module=ContentMod\u0026action=item\u0026id=1594",
              "refsource": "MISC",
              "url": "http://www.coresecurity.com/?module=ContentMod\u0026action=item\u0026id=1594"
            },
            {
              "name": "20070219 ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/460648/100/0/threaded"
            },
            {
              "name": "OpenPKG-SA-2006.039",
              "refsource": "OPENPKG",
              "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html"
            },
            {
              "name": "3330",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/3330"
            },
            {
              "name": "24163",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24163"
            },
            {
              "name": "23473",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23473"
            },
            {
              "name": "GLSA-200702-02",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200702-02.xml"
            },
            {
              "name": "23371",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23371"
            },
            {
              "name": "ADV-2006-4998",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4998"
            },
            {
              "name": "23392",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23392"
            },
            {
              "name": "20070221 Re: ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/460756/100/0/threaded"
            },
            {
              "name": "proftpd-controls-bo(30906)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30906"
            },
            {
              "name": "2006-0074",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0074/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6563",
    "datePublished": "2006-12-15T11:00:00",
    "dateReserved": "2006-12-14T00:00:00",
    "dateUpdated": "2024-08-07T20:33:59.205Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6170 (GCVE-0-2006-6170)

Vulnerability from cvelistv5 – Published: 2006-11-30 15:00 – Updated: 2024-08-07 20:19
VLAI?
Summary
Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2006/dsa-1222 vendor-advisoryx_refsource_DEBIAN
http://lists.grok.org.uk/pipermail/full-disclosur… mailing-listx_refsource_FULLDISC
http://www.securityfocus.com/archive/1/452993/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/23207 third-party-advisoryx_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://secunia.com/advisories/23141 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23174 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/bid/21326 vdb-entryx_refsource_BID
http://www.securityfocus.com/archive/1/452872/100… mailing-listx_refsource_BUGTRAQ
https://bugzilla.redhat.com/bugzilla/show_bug.cgi… x_refsource_CONFIRM
http://secunia.com/advisories/23184 third-party-advisoryx_refsource_SECUNIA
http://elegerov.blogspot.com/2006/10/do-you-remem… x_refsource_MISC
http://www.trustix.org/errata/2006/0066 vendor-advisoryx_refsource_TRUSTIX
http://secunia.com/advisories/23179 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20061… vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/archive/1/452228/100… mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.vupen.com/english/advisories/2006/4745 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:19:34.992Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-1222",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1222"
          },
          {
            "name": "20061128 ProFTPD mod_tls pre-authentication buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html"
          },
          {
            "name": "20061129 Re: ProFTPD mod_tls pre-authentication buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/452993/100/100/threaded"
          },
          {
            "name": "23207",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23207"
          },
          {
            "name": "SSA:2006-335-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
          },
          {
            "name": "23141",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23141"
          },
          {
            "name": "23174",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23174"
          },
          {
            "name": "MDKSA-2006:217-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
          },
          {
            "name": "21326",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21326"
          },
          {
            "name": "20061128 ProFTPD mod_tls pre-authentication buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/452872/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
          },
          {
            "name": "23184",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23184"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html"
          },
          {
            "name": "2006-0066",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0066"
          },
          {
            "name": "23179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23179"
          },
          {
            "name": "GLSA-200611-26",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
          },
          {
            "name": "20061121 Re: [ MDKSA-2006:217 ] - Updated proftpd packages fix vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/452228/100/100/threaded"
          },
          {
            "name": "proftpd-modtls-bo(30554)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30554"
          },
          {
            "name": "ADV-2006-4745",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4745"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-1222",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1222"
        },
        {
          "name": "20061128 ProFTPD mod_tls pre-authentication buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html"
        },
        {
          "name": "20061129 Re: ProFTPD mod_tls pre-authentication buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/452993/100/100/threaded"
        },
        {
          "name": "23207",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23207"
        },
        {
          "name": "SSA:2006-335-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
        },
        {
          "name": "23141",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23141"
        },
        {
          "name": "23174",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23174"
        },
        {
          "name": "MDKSA-2006:217-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
        },
        {
          "name": "21326",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21326"
        },
        {
          "name": "20061128 ProFTPD mod_tls pre-authentication buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/452872/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
        },
        {
          "name": "23184",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23184"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html"
        },
        {
          "name": "2006-0066",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0066"
        },
        {
          "name": "23179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23179"
        },
        {
          "name": "GLSA-200611-26",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
        },
        {
          "name": "20061121 Re: [ MDKSA-2006:217 ] - Updated proftpd packages fix vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/452228/100/100/threaded"
        },
        {
          "name": "proftpd-modtls-bo(30554)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30554"
        },
        {
          "name": "ADV-2006-4745",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4745"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6170",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-1222",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1222"
            },
            {
              "name": "20061128 ProFTPD mod_tls pre-authentication buffer overflow",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html"
            },
            {
              "name": "20061129 Re: ProFTPD mod_tls pre-authentication buffer overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/452993/100/100/threaded"
            },
            {
              "name": "23207",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23207"
            },
            {
              "name": "SSA:2006-335-02",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
            },
            {
              "name": "23141",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23141"
            },
            {
              "name": "23174",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23174"
            },
            {
              "name": "MDKSA-2006:217-1",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
            },
            {
              "name": "21326",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21326"
            },
            {
              "name": "20061128 ProFTPD mod_tls pre-authentication buffer overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/452872/100/0/threaded"
            },
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
            },
            {
              "name": "23184",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23184"
            },
            {
              "name": "http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html",
              "refsource": "MISC",
              "url": "http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html"
            },
            {
              "name": "2006-0066",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0066"
            },
            {
              "name": "23179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23179"
            },
            {
              "name": "GLSA-200611-26",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
            },
            {
              "name": "20061121 Re: [ MDKSA-2006:217 ] - Updated proftpd packages fix vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/452228/100/100/threaded"
            },
            {
              "name": "proftpd-modtls-bo(30554)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30554"
            },
            {
              "name": "ADV-2006-4745",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4745"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6170",
    "datePublished": "2006-11-30T15:00:00",
    "dateReserved": "2006-11-30T00:00:00",
    "dateUpdated": "2024-08-07T20:19:34.992Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6171 (GCVE-0-2006-6171)

Vulnerability from cvelistv5 – Published: 2006-11-30 15:00 – Updated: 2024-08-07 20:19
VLAI?
Summary
ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure. NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2006/dsa-1222 vendor-advisoryx_refsource_DEBIAN
http://proftp.cvs.sourceforge.net/proftp/proftpd/… x_refsource_MISC
http://www.debian.org/security/2006/dsa-1218 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/23207 third-party-advisoryx_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://secunia.com/advisories/23174 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.trustix.org/errata/2006/0070 vendor-advisoryx_refsource_TRUSTIX
http://secunia.com/advisories/23329 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/bugzilla/show_bug.cgi… x_refsource_CONFIRM
http://secunia.com/advisories/23184 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23179 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20061… vendor-advisoryx_refsource_GENTOO
http://www.openpkg.com/security/advisories/OpenPK… vendor-advisoryx_refsource_OPENPKG
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:19:34.625Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-1222",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1222"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://proftp.cvs.sourceforge.net/proftp/proftpd/src/main.c?r1=1.292\u0026r2=1.293\u0026sortby=date"
          },
          {
            "name": "DSA-1218",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1218"
          },
          {
            "name": "23207",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23207"
          },
          {
            "name": "SSA:2006-335-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
          },
          {
            "name": "23174",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23174"
          },
          {
            "name": "MDKSA-2006:217-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
          },
          {
            "name": "2006-0070",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0070"
          },
          {
            "name": "23329",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23329"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
          },
          {
            "name": "23184",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23184"
          },
          {
            "name": "23179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23179"
          },
          {
            "name": "GLSA-200611-26",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
          },
          {
            "name": "OpenPKG-SA-2006.035",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.035.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow.  NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure.  NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-12-04T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-1222",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1222"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://proftp.cvs.sourceforge.net/proftp/proftpd/src/main.c?r1=1.292\u0026r2=1.293\u0026sortby=date"
        },
        {
          "name": "DSA-1218",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1218"
        },
        {
          "name": "23207",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23207"
        },
        {
          "name": "SSA:2006-335-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
        },
        {
          "name": "23174",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23174"
        },
        {
          "name": "MDKSA-2006:217-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
        },
        {
          "name": "2006-0070",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0070"
        },
        {
          "name": "23329",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23329"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
        },
        {
          "name": "23184",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23184"
        },
        {
          "name": "23179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23179"
        },
        {
          "name": "GLSA-200611-26",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
        },
        {
          "name": "OpenPKG-SA-2006.035",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.035.html"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6171",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED **  ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow.  NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure.  NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-1222",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1222"
            },
            {
              "name": "http://proftp.cvs.sourceforge.net/proftp/proftpd/src/main.c?r1=1.292\u0026r2=1.293\u0026sortby=date",
              "refsource": "MISC",
              "url": "http://proftp.cvs.sourceforge.net/proftp/proftpd/src/main.c?r1=1.292\u0026r2=1.293\u0026sortby=date"
            },
            {
              "name": "DSA-1218",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1218"
            },
            {
              "name": "23207",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23207"
            },
            {
              "name": "SSA:2006-335-02",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
            },
            {
              "name": "23174",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23174"
            },
            {
              "name": "MDKSA-2006:217-1",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
            },
            {
              "name": "2006-0070",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0070"
            },
            {
              "name": "23329",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23329"
            },
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
            },
            {
              "name": "23184",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23184"
            },
            {
              "name": "23179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23179"
            },
            {
              "name": "GLSA-200611-26",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
            },
            {
              "name": "OpenPKG-SA-2006.035",
              "refsource": "OPENPKG",
              "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.035.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6171",
    "datePublished": "2006-11-30T15:00:00",
    "dateReserved": "2006-11-30T00:00:00",
    "dateUpdated": "2024-08-07T20:19:34.625Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5815 (GCVE-0-2006-5815)

Vulnerability from cvelistv5 – Published: 2006-11-08 23:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2006/4451 vdb-entryx_refsource_VUPEN
http://gleg.net/vulndisco_meta.shtml x_refsource_MISC
http://www.debian.org/security/2006/dsa-1222 vendor-advisoryx_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://secunia.com/advisories/23207 third-party-advisoryx_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www.trustix.org/errata/2006/0066/ vendor-advisoryx_refsource_TRUSTIX
http://www.securityfocus.com/archive/1/452760/100… mailing-listx_refsource_BUGTRAQ
http://securitytracker.com/id?1017167 vdb-entryx_refsource_SECTRACK
http://www.openpkg.org/security/advisories/OpenPK… vendor-advisoryx_refsource_OPENPKG
http://secunia.com/advisories/23174 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.trustix.org/errata/2006/0070 vendor-advisoryx_refsource_TRUSTIX
http://secunia.com/advisories/23069 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23000 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/bugzilla/show_bug.cgi… x_refsource_CONFIRM
http://secunia.com/advisories/22821 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23184 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23125 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/20992 vdb-entryx_refsource_BID
http://bugs.proftpd.org/show_bug.cgi?id=2858 x_refsource_CONFIRM
http://secunia.com/advisories/23179 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20061… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/22803 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:04:55.597Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-4451",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4451"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://gleg.net/vulndisco_meta.shtml"
          },
          {
            "name": "DSA-1222",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1222"
          },
          {
            "name": "MDKSA-2006:217",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217"
          },
          {
            "name": "23207",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23207"
          },
          {
            "name": "SSA:2006-335-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
          },
          {
            "name": "2006-0066",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0066/"
          },
          {
            "name": "20061127 CVE-2006-5815: remote code execution in ProFTPD",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/452760/100/200/threaded"
          },
          {
            "name": "1017167",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017167"
          },
          {
            "name": "OpenPKG-SA-2006.035",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html"
          },
          {
            "name": "23174",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23174"
          },
          {
            "name": "MDKSA-2006:217-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
          },
          {
            "name": "proftpd-code-execution(30147)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30147"
          },
          {
            "name": "2006-0070",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0070"
          },
          {
            "name": "23069",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23069"
          },
          {
            "name": "23000",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23000"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
          },
          {
            "name": "22821",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22821"
          },
          {
            "name": "23184",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23184"
          },
          {
            "name": "23125",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23125"
          },
          {
            "name": "20992",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20992"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.proftpd.org/show_bug.cgi?id=2858"
          },
          {
            "name": "23179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23179"
          },
          {
            "name": "GLSA-200611-26",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
          },
          {
            "name": "22803",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22803"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a \"ProFTPD remote exploit.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-4451",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4451"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://gleg.net/vulndisco_meta.shtml"
        },
        {
          "name": "DSA-1222",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1222"
        },
        {
          "name": "MDKSA-2006:217",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217"
        },
        {
          "name": "23207",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23207"
        },
        {
          "name": "SSA:2006-335-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
        },
        {
          "name": "2006-0066",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0066/"
        },
        {
          "name": "20061127 CVE-2006-5815: remote code execution in ProFTPD",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/452760/100/200/threaded"
        },
        {
          "name": "1017167",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017167"
        },
        {
          "name": "OpenPKG-SA-2006.035",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html"
        },
        {
          "name": "23174",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23174"
        },
        {
          "name": "MDKSA-2006:217-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
        },
        {
          "name": "proftpd-code-execution(30147)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30147"
        },
        {
          "name": "2006-0070",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0070"
        },
        {
          "name": "23069",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23069"
        },
        {
          "name": "23000",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23000"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
        },
        {
          "name": "22821",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22821"
        },
        {
          "name": "23184",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23184"
        },
        {
          "name": "23125",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23125"
        },
        {
          "name": "20992",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20992"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.proftpd.org/show_bug.cgi?id=2858"
        },
        {
          "name": "23179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23179"
        },
        {
          "name": "GLSA-200611-26",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
        },
        {
          "name": "22803",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22803"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5815",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a \"ProFTPD remote exploit.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-4451",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4451"
            },
            {
              "name": "http://gleg.net/vulndisco_meta.shtml",
              "refsource": "MISC",
              "url": "http://gleg.net/vulndisco_meta.shtml"
            },
            {
              "name": "DSA-1222",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1222"
            },
            {
              "name": "MDKSA-2006:217",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217"
            },
            {
              "name": "23207",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23207"
            },
            {
              "name": "SSA:2006-335-02",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
            },
            {
              "name": "2006-0066",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0066/"
            },
            {
              "name": "20061127 CVE-2006-5815: remote code execution in ProFTPD",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/452760/100/200/threaded"
            },
            {
              "name": "1017167",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017167"
            },
            {
              "name": "OpenPKG-SA-2006.035",
              "refsource": "OPENPKG",
              "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html"
            },
            {
              "name": "23174",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23174"
            },
            {
              "name": "MDKSA-2006:217-1",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
            },
            {
              "name": "proftpd-code-execution(30147)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30147"
            },
            {
              "name": "2006-0070",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0070"
            },
            {
              "name": "23069",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23069"
            },
            {
              "name": "23000",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23000"
            },
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
            },
            {
              "name": "22821",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22821"
            },
            {
              "name": "23184",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23184"
            },
            {
              "name": "23125",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23125"
            },
            {
              "name": "20992",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20992"
            },
            {
              "name": "http://bugs.proftpd.org/show_bug.cgi?id=2858",
              "refsource": "CONFIRM",
              "url": "http://bugs.proftpd.org/show_bug.cgi?id=2858"
            },
            {
              "name": "23179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23179"
            },
            {
              "name": "GLSA-200611-26",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
            },
            {
              "name": "22803",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22803"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5815",
    "datePublished": "2006-11-08T23:00:00",
    "dateReserved": "2006-11-08T00:00:00",
    "dateUpdated": "2024-08-07T20:04:55.597Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2390 (GCVE-0-2005-2390)

Vulnerability from cvelistv5 – Published: 2005-07-27 04:00 – Updated: 2024-08-07 22:22
VLAI?
Summary
Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=112604373503912&w=2 vendor-advisoryx_refsource_OPENPKG
http://www.securityfocus.com/bid/14381 vdb-entryx_refsource_BID
http://www.securityfocus.com/bid/14380 vdb-entryx_refsource_BID
http://www.debian.org/security/2005/dsa-795 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/16181 third-party-advisoryx_refsource_SECUNIA
http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2 x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:22:49.114Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "OpenPKG-SA-2005.020",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112604373503912\u0026w=2"
          },
          {
            "name": "14381",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14381"
          },
          {
            "name": "14380",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14380"
          },
          {
            "name": "DSA-795",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-795"
          },
          {
            "name": "16181",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16181"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-07-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "OpenPKG-SA-2005.020",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112604373503912\u0026w=2"
        },
        {
          "name": "14381",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14381"
        },
        {
          "name": "14380",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14380"
        },
        {
          "name": "DSA-795",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-795"
        },
        {
          "name": "16181",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16181"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2390",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "OpenPKG-SA-2005.020",
              "refsource": "OPENPKG",
              "url": "http://marc.info/?l=bugtraq\u0026m=112604373503912\u0026w=2"
            },
            {
              "name": "14381",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14381"
            },
            {
              "name": "14380",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14380"
            },
            {
              "name": "DSA-795",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-795"
            },
            {
              "name": "16181",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16181"
            },
            {
              "name": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2",
              "refsource": "CONFIRM",
              "url": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2390",
    "datePublished": "2005-07-27T04:00:00",
    "dateReserved": "2005-07-27T00:00:00",
    "dateUpdated": "2024-08-07T22:22:49.114Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-1500 (GCVE-0-2001-1500)

Vulnerability from cvelistv5 – Published: 2005-06-21 04:00 – Updated: 2024-08-08 04:58
VLAI?
Summary
ProFTPD 1.2.2rc2, and possibly other versions, does not properly verify reverse-resolved hostnames by performing forward resolution, which allows remote attackers to bypass ACLs or cause an incorrect client hostname to be logged.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/212805 mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/3310 vdb-entryx_refsource_BID
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRAKE
http://distro.conectiva.com.br/atualizacoes/?id=a… vendor-advisoryx_refsource_CONECTIVA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:58:11.664Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20010907 ProFTPd and reverse DNS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/212805"
          },
          {
            "name": "3310",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3310"
          },
          {
            "name": "MDKSA-2002:005",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:005"
          },
          {
            "name": "CLA-2002:450",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000450"
          },
          {
            "name": "proftpd-unresolved-hostname(7126)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7126"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-09-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ProFTPD 1.2.2rc2, and possibly other versions, does not properly verify reverse-resolved hostnames by performing forward resolution, which allows remote attackers to bypass ACLs or cause an incorrect client hostname to be logged."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20010907 ProFTPd and reverse DNS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/212805"
        },
        {
          "name": "3310",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3310"
        },
        {
          "name": "MDKSA-2002:005",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:005"
        },
        {
          "name": "CLA-2002:450",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000450"
        },
        {
          "name": "proftpd-unresolved-hostname(7126)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7126"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1500",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ProFTPD 1.2.2rc2, and possibly other versions, does not properly verify reverse-resolved hostnames by performing forward resolution, which allows remote attackers to bypass ACLs or cause an incorrect client hostname to be logged."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20010907 ProFTPd and reverse DNS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/212805"
            },
            {
              "name": "3310",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3310"
            },
            {
              "name": "MDKSA-2002:005",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:005"
            },
            {
              "name": "CLA-2002:450",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000450"
            },
            {
              "name": "proftpd-unresolved-hostname(7126)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7126"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1500",
    "datePublished": "2005-06-21T04:00:00",
    "dateReserved": "2005-06-21T00:00:00",
    "dateUpdated": "2024-08-08T04:58:11.664Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-1501 (GCVE-0-2001-1501)

Vulnerability from cvelistv5 – Published: 2005-06-21 04:00 – Updated: 2024-08-08 04:58
VLAI?
Summary
The glob functionality in ProFTPD 1.2.1, and possibly other versions allows remote attackers to cause a denial of service (CPU and memory consumption) via commands with large numbers of wildcard and other special characters, as demonstrated using an ls command with multiple (1) "*/..", (2) "*/.*", or (3) ".*./*?/" sequences in the argument.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRAKE
http://distro.conectiva.com.br/atualizacoes/?id=a… vendor-advisoryx_refsource_CONECTIVA
http://online.securityfocus.com/archive/1/169395 mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:58:11.373Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "MDKSA-2002:005",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:005"
          },
          {
            "name": "CLA-2002:450",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000450"
          },
          {
            "name": "20010315 [SECURITY] DoS vulnerability in ProFTPD",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://online.securityfocus.com/archive/1/169395"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-03-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The glob functionality in ProFTPD 1.2.1, and possibly other versions allows remote attackers to cause a denial of service (CPU and memory consumption) via commands with large numbers of wildcard and other special characters, as demonstrated using an ls command with multiple (1) \"*/..\", (2) \"*/.*\", or (3) \".*./*?/\" sequences in the argument."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-10-18T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "MDKSA-2002:005",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:005"
        },
        {
          "name": "CLA-2002:450",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000450"
        },
        {
          "name": "20010315 [SECURITY] DoS vulnerability in ProFTPD",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://online.securityfocus.com/archive/1/169395"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1501",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The glob functionality in ProFTPD 1.2.1, and possibly other versions allows remote attackers to cause a denial of service (CPU and memory consumption) via commands with large numbers of wildcard and other special characters, as demonstrated using an ls command with multiple (1) \"*/..\", (2) \"*/.*\", or (3) \".*./*?/\" sequences in the argument."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "MDKSA-2002:005",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:005"
            },
            {
              "name": "CLA-2002:450",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000450"
            },
            {
              "name": "20010315 [SECURITY] DoS vulnerability in ProFTPD",
              "refsource": "BUGTRAQ",
              "url": "http://online.securityfocus.com/archive/1/169395"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1501",
    "datePublished": "2005-06-21T04:00:00",
    "dateReserved": "2005-06-21T00:00:00",
    "dateUpdated": "2024-08-08T04:58:11.373Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-0542 (GCVE-0-2009-0542)

Vulnerability from nvd – Published: 2009-02-12 16:00 – Updated: 2024-08-07 04:40
VLAI?
Summary
SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a "%" (percent) character in the username, which introduces a "'" (single quote) character during variable substitution by mod_sql.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2009/dsa-1730 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/archive/1/500833/100… mailing-listx_refsource_BUGTRAQ
http://www.openwall.com/lists/oss-security/2009/02/11/5 mailing-listx_refsource_MLIST
http://bugs.proftpd.org/show_bug.cgi?id=3180 x_refsource_CONFIRM
http://www.openwall.com/lists/oss-security/2009/02/11/3 mailing-listx_refsource_MLIST
http://secunia.com/advisories/34268 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/500852/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/500851/100… mailing-listx_refsource_BUGTRAQ
http://www.openwall.com/lists/oss-security/2009/02/11/1 mailing-listx_refsource_MLIST
http://security.gentoo.org/glsa/glsa-200903-27.xml vendor-advisoryx_refsource_GENTOO
https://www.exploit-db.com/exploits/8037 exploitx_refsource_EXPLOIT-DB
http://www.securityfocus.com/archive/1/500823/100… mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:04.250Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-1730",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2009/dsa-1730"
          },
          {
            "name": "20090210 Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/500833/100/0/threaded"
          },
          {
            "name": "[oss-security] 20090211 Re: CVE request for proftpd",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/02/11/5"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.proftpd.org/show_bug.cgi?id=3180"
          },
          {
            "name": "[oss-security] 20090211 Re: CVE request for proftpd",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/02/11/3"
          },
          {
            "name": "34268",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/34268"
          },
          {
            "name": "MDVSA-2009:061",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
          },
          {
            "name": "20090211 Re: Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/500852/100/0/threaded"
          },
          {
            "name": "20090210 ProFTPd with mod_mysql Authentication Bypass Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/500851/100/0/threaded"
          },
          {
            "name": "[oss-security] 20090211 CVE request for proftpd",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2009/02/11/1"
          },
          {
            "name": "GLSA-200903-27",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200903-27.xml"
          },
          {
            "name": "8037",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/8037"
          },
          {
            "name": "20090210 Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/500823/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-02-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a \"%\" (percent) character in the username, which introduces a \"\u0027\" (single quote) character during variable substitution by mod_sql."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-11T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-1730",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2009/dsa-1730"
        },
        {
          "name": "20090210 Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/500833/100/0/threaded"
        },
        {
          "name": "[oss-security] 20090211 Re: CVE request for proftpd",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/02/11/5"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.proftpd.org/show_bug.cgi?id=3180"
        },
        {
          "name": "[oss-security] 20090211 Re: CVE request for proftpd",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/02/11/3"
        },
        {
          "name": "34268",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/34268"
        },
        {
          "name": "MDVSA-2009:061",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
        },
        {
          "name": "20090211 Re: Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/500852/100/0/threaded"
        },
        {
          "name": "20090210 ProFTPd with mod_mysql Authentication Bypass Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/500851/100/0/threaded"
        },
        {
          "name": "[oss-security] 20090211 CVE request for proftpd",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2009/02/11/1"
        },
        {
          "name": "GLSA-200903-27",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200903-27.xml"
        },
        {
          "name": "8037",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/8037"
        },
        {
          "name": "20090210 Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/500823/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0542",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in ProFTPD Server 1.3.1 through 1.3.2rc2 allows remote attackers to execute arbitrary SQL commands via a \"%\" (percent) character in the username, which introduces a \"\u0027\" (single quote) character during variable substitution by mod_sql."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-1730",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2009/dsa-1730"
            },
            {
              "name": "20090210 Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/500833/100/0/threaded"
            },
            {
              "name": "[oss-security] 20090211 Re: CVE request for proftpd",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/02/11/5"
            },
            {
              "name": "http://bugs.proftpd.org/show_bug.cgi?id=3180",
              "refsource": "CONFIRM",
              "url": "http://bugs.proftpd.org/show_bug.cgi?id=3180"
            },
            {
              "name": "[oss-security] 20090211 Re: CVE request for proftpd",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/02/11/3"
            },
            {
              "name": "34268",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/34268"
            },
            {
              "name": "MDVSA-2009:061",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
            },
            {
              "name": "20090211 Re: Re: Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/500852/100/0/threaded"
            },
            {
              "name": "20090210 ProFTPd with mod_mysql Authentication Bypass Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/500851/100/0/threaded"
            },
            {
              "name": "[oss-security] 20090211 CVE request for proftpd",
              "refsource": "MLIST",
              "url": "http://www.openwall.com/lists/oss-security/2009/02/11/1"
            },
            {
              "name": "GLSA-200903-27",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200903-27.xml"
            },
            {
              "name": "8037",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/8037"
            },
            {
              "name": "20090210 Another SQL injection in ProFTPd with mod_mysql (probably postgres as well)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/500823/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0542",
    "datePublished": "2009-02-12T16:00:00",
    "dateReserved": "2009-02-12T00:00:00",
    "dateUpdated": "2024-08-07T04:40:04.250Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2008-4242 (GCVE-0-2008-4242)

Vulnerability from nvd – Published: 2008-09-25 19:00 – Updated: 2024-08-07 10:08
VLAI?
Summary
ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/31289 vdb-entryx_refsource_BID
http://securityreason.com/achievement_securityalert/56 third-party-advisoryx_refsource_SREASONRES
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securitytracker.com/id?1020945 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/31930 third-party-advisoryx_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/33261 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/33413 third-party-advisoryx_refsource_SECUNIA
http://securityreason.com/securityalert/4313 third-party-advisoryx_refsource_SREASON
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://www.debian.org/security/2008/dsa-1689 vendor-advisoryx_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://bugs.proftpd.org/show_bug.cgi?id=3115 x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T10:08:34.954Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "31289",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/31289"
          },
          {
            "name": "20080926 multiple vendor ftpd - Cross-site request forgery",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASONRES",
              "x_transferred"
            ],
            "url": "http://securityreason.com/achievement_securityalert/56"
          },
          {
            "name": "MDVSA-2009:061",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
          },
          {
            "name": "1020945",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1020945"
          },
          {
            "name": "31930",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/31930"
          },
          {
            "name": "FEDORA-2009-0195",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00245.html"
          },
          {
            "name": "33261",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33261"
          },
          {
            "name": "33413",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33413"
          },
          {
            "name": "4313",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/4313"
          },
          {
            "name": "FEDORA-2009-0064",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00078.html"
          },
          {
            "name": "DSA-1689",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2008/dsa-1689"
          },
          {
            "name": "proftpd-url-csrf(45274)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45274"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.proftpd.org/show_bug.cgi?id=3115"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2008-09-20T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "31289",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/31289"
        },
        {
          "name": "20080926 multiple vendor ftpd - Cross-site request forgery",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASONRES"
          ],
          "url": "http://securityreason.com/achievement_securityalert/56"
        },
        {
          "name": "MDVSA-2009:061",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
        },
        {
          "name": "1020945",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1020945"
        },
        {
          "name": "31930",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/31930"
        },
        {
          "name": "FEDORA-2009-0195",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00245.html"
        },
        {
          "name": "33261",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33261"
        },
        {
          "name": "33413",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33413"
        },
        {
          "name": "4313",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/4313"
        },
        {
          "name": "FEDORA-2009-0064",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00078.html"
        },
        {
          "name": "DSA-1689",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2008/dsa-1689"
        },
        {
          "name": "proftpd-url-csrf(45274)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45274"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.proftpd.org/show_bug.cgi?id=3115"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2008-4242",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ProFTPD 1.3.1 interprets long commands from an FTP client as multiple commands, which allows remote attackers to conduct cross-site request forgery (CSRF) attacks and execute arbitrary FTP commands via a long ftp:// URI that leverages an existing session from the FTP client implementation in a web browser."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "31289",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/31289"
            },
            {
              "name": "20080926 multiple vendor ftpd - Cross-site request forgery",
              "refsource": "SREASONRES",
              "url": "http://securityreason.com/achievement_securityalert/56"
            },
            {
              "name": "MDVSA-2009:061",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:061"
            },
            {
              "name": "1020945",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1020945"
            },
            {
              "name": "31930",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/31930"
            },
            {
              "name": "FEDORA-2009-0195",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00245.html"
            },
            {
              "name": "33261",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33261"
            },
            {
              "name": "33413",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33413"
            },
            {
              "name": "4313",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/4313"
            },
            {
              "name": "FEDORA-2009-0064",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2009-January/msg00078.html"
            },
            {
              "name": "DSA-1689",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2008/dsa-1689"
            },
            {
              "name": "proftpd-url-csrf(45274)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/45274"
            },
            {
              "name": "http://bugs.proftpd.org/show_bug.cgi?id=3115",
              "refsource": "CONFIRM",
              "url": "http://bugs.proftpd.org/show_bug.cgi?id=3115"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2008-4242",
    "datePublished": "2008-09-25T19:00:00",
    "dateReserved": "2008-09-25T00:00:00",
    "dateUpdated": "2024-08-07T10:08:34.954Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-2165 (GCVE-0-2007-2165)

Vulnerability from nvd – Published: 2007-04-22 19:00 – Updated: 2024-08-07 13:23
VLAI?
Summary
The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255 x_refsource_MISC
http://bugs.proftpd.org/show_bug.cgi?id=2922 x_refsource_CONFIRM
https://bugzilla.redhat.com/show_bug.cgi?id=237533 x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://secunia.com/advisories/25724 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/23546 vdb-entryx_refsource_BID
http://secunia.com/advisories/24867 third-party-advisoryx_refsource_SECUNIA
http://osvdb.org/34602 vdb-entryx_refsource_OSVDB
http://www.vupen.com/english/advisories/2007/1444 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1017931 vdb-entryx_refsource_SECTRACK
https://www.redhat.com/archives/fedora-package-an… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/27516 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:23:50.950Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.proftpd.org/show_bug.cgi?id=2922"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237533"
          },
          {
            "name": "MDKSA-2007:130",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:130"
          },
          {
            "name": "25724",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25724"
          },
          {
            "name": "23546",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23546"
          },
          {
            "name": "24867",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24867"
          },
          {
            "name": "34602",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/34602"
          },
          {
            "name": "ADV-2007-1444",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1444"
          },
          {
            "name": "1017931",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017931"
          },
          {
            "name": "FEDORA-2007-2613",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00065.html"
          },
          {
            "name": "27516",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/27516"
          },
          {
            "name": "proftpd-authapi-security-bypass(33733)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33733"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.proftpd.org/show_bug.cgi?id=2922"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237533"
        },
        {
          "name": "MDKSA-2007:130",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:130"
        },
        {
          "name": "25724",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25724"
        },
        {
          "name": "23546",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23546"
        },
        {
          "name": "24867",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24867"
        },
        {
          "name": "34602",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/34602"
        },
        {
          "name": "ADV-2007-1444",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1444"
        },
        {
          "name": "1017931",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017931"
        },
        {
          "name": "FEDORA-2007-2613",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00065.html"
        },
        {
          "name": "27516",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/27516"
        },
        {
          "name": "proftpd-authapi-security-bypass(33733)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33733"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2165",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The Auth API in ProFTPD before 20070417, when multiple simultaneous authentication modules are configured, does not require that the module that checks authentication is the same as the module that retrieves authentication data, which might allow remote attackers to bypass authentication, as demonstrated by use of SQLAuthTypes Plaintext in mod_sql, with data retrieved from /etc/passwd."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255",
              "refsource": "MISC",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=419255"
            },
            {
              "name": "http://bugs.proftpd.org/show_bug.cgi?id=2922",
              "refsource": "CONFIRM",
              "url": "http://bugs.proftpd.org/show_bug.cgi?id=2922"
            },
            {
              "name": "https://bugzilla.redhat.com/show_bug.cgi?id=237533",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/show_bug.cgi?id=237533"
            },
            {
              "name": "MDKSA-2007:130",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:130"
            },
            {
              "name": "25724",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25724"
            },
            {
              "name": "23546",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23546"
            },
            {
              "name": "24867",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24867"
            },
            {
              "name": "34602",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/34602"
            },
            {
              "name": "ADV-2007-1444",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1444"
            },
            {
              "name": "1017931",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017931"
            },
            {
              "name": "FEDORA-2007-2613",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00065.html"
            },
            {
              "name": "27516",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/27516"
            },
            {
              "name": "proftpd-authapi-security-bypass(33733)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/33733"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2165",
    "datePublished": "2007-04-22T19:00:00",
    "dateReserved": "2007-04-22T00:00:00",
    "dateUpdated": "2024-08-07T13:23:50.950Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4816 (GCVE-0-2005-4816)

Vulnerability from nvd – Published: 2006-12-23 11:00 – Updated: 2024-08-08 00:01
VLAI?
Summary
Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://archives.neohapsis.com/archives/dailydave/… mailing-listx_refsource_MLIST
http://bugs.proftpd.org/show_bug.cgi?id=2658 x_refsource_CONFIRM
http://www.securityfocus.com/bid/16535 vdb-entryx_refsource_BID
http://www.debian.org/security/2007/dsa-1245 vendor-advisoryx_refsource_DEBIAN
http://www.osvdb.org/23063 vdb-entryx_refsource_OSVDB
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:01:23.301Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[Dailydave] 20060207 ProFTPD bug",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/dailydave/2006-q1/0122.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.proftpd.org/show_bug.cgi?id=2658"
          },
          {
            "name": "16535",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16535"
          },
          {
            "name": "DSA-1245",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1245"
          },
          {
            "name": "23063",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/23063"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-07-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-06-09T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[Dailydave] 20060207 ProFTPD bug",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://archives.neohapsis.com/archives/dailydave/2006-q1/0122.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.proftpd.org/show_bug.cgi?id=2658"
        },
        {
          "name": "16535",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16535"
        },
        {
          "name": "DSA-1245",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1245"
        },
        {
          "name": "23063",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/23063"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4816",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in mod_radius in ProFTPD before 1.3.0rc2 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long password."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[Dailydave] 20060207 ProFTPD bug",
              "refsource": "MLIST",
              "url": "http://archives.neohapsis.com/archives/dailydave/2006-q1/0122.html"
            },
            {
              "name": "http://bugs.proftpd.org/show_bug.cgi?id=2658",
              "refsource": "CONFIRM",
              "url": "http://bugs.proftpd.org/show_bug.cgi?id=2658"
            },
            {
              "name": "16535",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16535"
            },
            {
              "name": "DSA-1245",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1245"
            },
            {
              "name": "23063",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/23063"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4816",
    "datePublished": "2006-12-23T11:00:00",
    "dateReserved": "2006-12-22T00:00:00",
    "dateUpdated": "2024-08-08T00:01:23.301Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6563 (GCVE-0-2006-6563)

Vulnerability from nvd – Published: 2006-12-15 11:00 – Updated: 2024-08-07 20:33
VLAI?
Summary
Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/bid/21587 vdb-entryx_refsource_BID
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/archive/1/454320/100… mailing-listx_refsource_BUGTRAQ
http://www.proftpd.org/docs/NEWS-1.3.1rc1 x_refsource_CONFIRM
http://www.coresecurity.com/?module=ContentMod&ac… x_refsource_MISC
http://www.securityfocus.com/archive/1/460648/100… mailing-listx_refsource_BUGTRAQ
http://www.openpkg.com/security/advisories/OpenPK… vendor-advisoryx_refsource_OPENPKG
https://www.exploit-db.com/exploits/3330 exploitx_refsource_EXPLOIT-DB
http://secunia.com/advisories/24163 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23473 third-party-advisoryx_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-200702-02.xml vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/23371 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/4998 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/23392 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/460756/100… mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.trustix.org/errata/2006/0074/ vendor-advisoryx_refsource_TRUSTIX
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:33:59.205Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "21587",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21587"
          },
          {
            "name": "MDKSA-2006:232",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:232"
          },
          {
            "name": "20061213 CORE-2006-1127: ProFTPD Controls Buffer Overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/454320/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.proftpd.org/docs/NEWS-1.3.1rc1"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.coresecurity.com/?module=ContentMod\u0026action=item\u0026id=1594"
          },
          {
            "name": "20070219 ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/460648/100/0/threaded"
          },
          {
            "name": "OpenPKG-SA-2006.039",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html"
          },
          {
            "name": "3330",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/3330"
          },
          {
            "name": "24163",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24163"
          },
          {
            "name": "23473",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23473"
          },
          {
            "name": "GLSA-200702-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200702-02.xml"
          },
          {
            "name": "23371",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23371"
          },
          {
            "name": "ADV-2006-4998",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4998"
          },
          {
            "name": "23392",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23392"
          },
          {
            "name": "20070221 Re: ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/460756/100/0/threaded"
          },
          {
            "name": "proftpd-controls-bo(30906)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30906"
          },
          {
            "name": "2006-0074",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0074/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-12-13T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "21587",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21587"
        },
        {
          "name": "MDKSA-2006:232",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:232"
        },
        {
          "name": "20061213 CORE-2006-1127: ProFTPD Controls Buffer Overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/454320/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.proftpd.org/docs/NEWS-1.3.1rc1"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.coresecurity.com/?module=ContentMod\u0026action=item\u0026id=1594"
        },
        {
          "name": "20070219 ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/460648/100/0/threaded"
        },
        {
          "name": "OpenPKG-SA-2006.039",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html"
        },
        {
          "name": "3330",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/3330"
        },
        {
          "name": "24163",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24163"
        },
        {
          "name": "23473",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23473"
        },
        {
          "name": "GLSA-200702-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200702-02.xml"
        },
        {
          "name": "23371",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23371"
        },
        {
          "name": "ADV-2006-4998",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4998"
        },
        {
          "name": "23392",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23392"
        },
        {
          "name": "20070221 Re: ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/460756/100/0/threaded"
        },
        {
          "name": "proftpd-controls-bo(30906)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30906"
        },
        {
          "name": "2006-0074",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0074/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6563",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the pr_ctrls_recv_request function in ctrls.c in the mod_ctrls module in ProFTPD before 1.3.1rc1 allows local users to execute arbitrary code via a large reqarglen length value."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "21587",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21587"
            },
            {
              "name": "MDKSA-2006:232",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:232"
            },
            {
              "name": "20061213 CORE-2006-1127: ProFTPD Controls Buffer Overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/454320/100/0/threaded"
            },
            {
              "name": "http://www.proftpd.org/docs/NEWS-1.3.1rc1",
              "refsource": "CONFIRM",
              "url": "http://www.proftpd.org/docs/NEWS-1.3.1rc1"
            },
            {
              "name": "http://www.coresecurity.com/?module=ContentMod\u0026action=item\u0026id=1594",
              "refsource": "MISC",
              "url": "http://www.coresecurity.com/?module=ContentMod\u0026action=item\u0026id=1594"
            },
            {
              "name": "20070219 ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/460648/100/0/threaded"
            },
            {
              "name": "OpenPKG-SA-2006.039",
              "refsource": "OPENPKG",
              "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.039.html"
            },
            {
              "name": "3330",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/3330"
            },
            {
              "name": "24163",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24163"
            },
            {
              "name": "23473",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23473"
            },
            {
              "name": "GLSA-200702-02",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200702-02.xml"
            },
            {
              "name": "23371",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23371"
            },
            {
              "name": "ADV-2006-4998",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4998"
            },
            {
              "name": "23392",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23392"
            },
            {
              "name": "20070221 Re: ProFTPD 1.3.0/1.3.0a (mod_ctrls support) Local Buffer Overflow Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/460756/100/0/threaded"
            },
            {
              "name": "proftpd-controls-bo(30906)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30906"
            },
            {
              "name": "2006-0074",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0074/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6563",
    "datePublished": "2006-12-15T11:00:00",
    "dateReserved": "2006-12-14T00:00:00",
    "dateUpdated": "2024-08-07T20:33:59.205Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6170 (GCVE-0-2006-6170)

Vulnerability from nvd – Published: 2006-11-30 15:00 – Updated: 2024-08-07 20:19
VLAI?
Summary
Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2006/dsa-1222 vendor-advisoryx_refsource_DEBIAN
http://lists.grok.org.uk/pipermail/full-disclosur… mailing-listx_refsource_FULLDISC
http://www.securityfocus.com/archive/1/452993/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/23207 third-party-advisoryx_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://secunia.com/advisories/23141 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23174 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/bid/21326 vdb-entryx_refsource_BID
http://www.securityfocus.com/archive/1/452872/100… mailing-listx_refsource_BUGTRAQ
https://bugzilla.redhat.com/bugzilla/show_bug.cgi… x_refsource_CONFIRM
http://secunia.com/advisories/23184 third-party-advisoryx_refsource_SECUNIA
http://elegerov.blogspot.com/2006/10/do-you-remem… x_refsource_MISC
http://www.trustix.org/errata/2006/0066 vendor-advisoryx_refsource_TRUSTIX
http://secunia.com/advisories/23179 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20061… vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/archive/1/452228/100… mailing-listx_refsource_BUGTRAQ
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.vupen.com/english/advisories/2006/4745 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:19:34.992Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-1222",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1222"
          },
          {
            "name": "20061128 ProFTPD mod_tls pre-authentication buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html"
          },
          {
            "name": "20061129 Re: ProFTPD mod_tls pre-authentication buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/452993/100/100/threaded"
          },
          {
            "name": "23207",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23207"
          },
          {
            "name": "SSA:2006-335-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
          },
          {
            "name": "23141",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23141"
          },
          {
            "name": "23174",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23174"
          },
          {
            "name": "MDKSA-2006:217-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
          },
          {
            "name": "21326",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/21326"
          },
          {
            "name": "20061128 ProFTPD mod_tls pre-authentication buffer overflow",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/452872/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
          },
          {
            "name": "23184",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23184"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html"
          },
          {
            "name": "2006-0066",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0066"
          },
          {
            "name": "23179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23179"
          },
          {
            "name": "GLSA-200611-26",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
          },
          {
            "name": "20061121 Re: [ MDKSA-2006:217 ] - Updated proftpd packages fix vulnerabilities",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/452228/100/100/threaded"
          },
          {
            "name": "proftpd-modtls-bo(30554)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30554"
          },
          {
            "name": "ADV-2006-4745",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4745"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-1222",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1222"
        },
        {
          "name": "20061128 ProFTPD mod_tls pre-authentication buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html"
        },
        {
          "name": "20061129 Re: ProFTPD mod_tls pre-authentication buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/452993/100/100/threaded"
        },
        {
          "name": "23207",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23207"
        },
        {
          "name": "SSA:2006-335-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
        },
        {
          "name": "23141",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23141"
        },
        {
          "name": "23174",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23174"
        },
        {
          "name": "MDKSA-2006:217-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
        },
        {
          "name": "21326",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/21326"
        },
        {
          "name": "20061128 ProFTPD mod_tls pre-authentication buffer overflow",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/452872/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
        },
        {
          "name": "23184",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23184"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html"
        },
        {
          "name": "2006-0066",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0066"
        },
        {
          "name": "23179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23179"
        },
        {
          "name": "GLSA-200611-26",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
        },
        {
          "name": "20061121 Re: [ MDKSA-2006:217 ] - Updated proftpd packages fix vulnerabilities",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/452228/100/100/threaded"
        },
        {
          "name": "proftpd-modtls-bo(30554)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30554"
        },
        {
          "name": "ADV-2006-4745",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4745"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6170",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the tls_x509_name_oneline function in the mod_tls module, as used in ProFTPD 1.3.0a and earlier, and possibly other products, allows remote attackers to execute arbitrary code via a large data length argument, a different vulnerability than CVE-2006-5815."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-1222",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1222"
            },
            {
              "name": "20061128 ProFTPD mod_tls pre-authentication buffer overflow",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-November/050935.html"
            },
            {
              "name": "20061129 Re: ProFTPD mod_tls pre-authentication buffer overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/452993/100/100/threaded"
            },
            {
              "name": "23207",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23207"
            },
            {
              "name": "SSA:2006-335-02",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
            },
            {
              "name": "23141",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23141"
            },
            {
              "name": "23174",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23174"
            },
            {
              "name": "MDKSA-2006:217-1",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
            },
            {
              "name": "21326",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/21326"
            },
            {
              "name": "20061128 ProFTPD mod_tls pre-authentication buffer overflow",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/452872/100/0/threaded"
            },
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
            },
            {
              "name": "23184",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23184"
            },
            {
              "name": "http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html",
              "refsource": "MISC",
              "url": "http://elegerov.blogspot.com/2006/10/do-you-remember-2-years-old-overflow.html"
            },
            {
              "name": "2006-0066",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0066"
            },
            {
              "name": "23179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23179"
            },
            {
              "name": "GLSA-200611-26",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
            },
            {
              "name": "20061121 Re: [ MDKSA-2006:217 ] - Updated proftpd packages fix vulnerabilities",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/452228/100/100/threaded"
            },
            {
              "name": "proftpd-modtls-bo(30554)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30554"
            },
            {
              "name": "ADV-2006-4745",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4745"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6170",
    "datePublished": "2006-11-30T15:00:00",
    "dateReserved": "2006-11-30T00:00:00",
    "dateUpdated": "2024-08-07T20:19:34.992Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-6171 (GCVE-0-2006-6171)

Vulnerability from nvd – Published: 2006-11-30 15:00 – Updated: 2024-08-07 20:19
VLAI?
Summary
ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow. NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure. NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.debian.org/security/2006/dsa-1222 vendor-advisoryx_refsource_DEBIAN
http://proftp.cvs.sourceforge.net/proftp/proftpd/… x_refsource_MISC
http://www.debian.org/security/2006/dsa-1218 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/23207 third-party-advisoryx_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://secunia.com/advisories/23174 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.trustix.org/errata/2006/0070 vendor-advisoryx_refsource_TRUSTIX
http://secunia.com/advisories/23329 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/bugzilla/show_bug.cgi… x_refsource_CONFIRM
http://secunia.com/advisories/23184 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23179 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20061… vendor-advisoryx_refsource_GENTOO
http://www.openpkg.com/security/advisories/OpenPK… vendor-advisoryx_refsource_OPENPKG
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:19:34.625Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-1222",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1222"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://proftp.cvs.sourceforge.net/proftp/proftpd/src/main.c?r1=1.292\u0026r2=1.293\u0026sortby=date"
          },
          {
            "name": "DSA-1218",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1218"
          },
          {
            "name": "23207",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23207"
          },
          {
            "name": "SSA:2006-335-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
          },
          {
            "name": "23174",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23174"
          },
          {
            "name": "MDKSA-2006:217-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
          },
          {
            "name": "2006-0070",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0070"
          },
          {
            "name": "23329",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23329"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
          },
          {
            "name": "23184",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23184"
          },
          {
            "name": "23179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23179"
          },
          {
            "name": "GLSA-200611-26",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
          },
          {
            "name": "OpenPKG-SA-2006.035",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.035.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow.  NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure.  NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-12-04T10:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-1222",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1222"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://proftp.cvs.sourceforge.net/proftp/proftpd/src/main.c?r1=1.292\u0026r2=1.293\u0026sortby=date"
        },
        {
          "name": "DSA-1218",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1218"
        },
        {
          "name": "23207",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23207"
        },
        {
          "name": "SSA:2006-335-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
        },
        {
          "name": "23174",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23174"
        },
        {
          "name": "MDKSA-2006:217-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
        },
        {
          "name": "2006-0070",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0070"
        },
        {
          "name": "23329",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23329"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
        },
        {
          "name": "23184",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23184"
        },
        {
          "name": "23179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23179"
        },
        {
          "name": "GLSA-200611-26",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
        },
        {
          "name": "OpenPKG-SA-2006.035",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.035.html"
        }
      ],
      "tags": [
        "disputed"
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-6171",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "** DISPUTED **  ProFTPD 1.3.0a and earlier does not properly set the buffer size limit when CommandBufferSize is specified in the configuration file, which leads to an off-by-two buffer underflow.  NOTE: in November 2006, the role of CommandBufferSize was originally associated with CVE-2006-5815, but this was an error stemming from a vague initial disclosure.  NOTE: ProFTPD developers dispute this issue, saying that the relevant memory location is overwritten by assignment before further use within the affected function, so this is not a vulnerability."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-1222",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1222"
            },
            {
              "name": "http://proftp.cvs.sourceforge.net/proftp/proftpd/src/main.c?r1=1.292\u0026r2=1.293\u0026sortby=date",
              "refsource": "MISC",
              "url": "http://proftp.cvs.sourceforge.net/proftp/proftpd/src/main.c?r1=1.292\u0026r2=1.293\u0026sortby=date"
            },
            {
              "name": "DSA-1218",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1218"
            },
            {
              "name": "23207",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23207"
            },
            {
              "name": "SSA:2006-335-02",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
            },
            {
              "name": "23174",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23174"
            },
            {
              "name": "MDKSA-2006:217-1",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
            },
            {
              "name": "2006-0070",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0070"
            },
            {
              "name": "23329",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23329"
            },
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
            },
            {
              "name": "23184",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23184"
            },
            {
              "name": "23179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23179"
            },
            {
              "name": "GLSA-200611-26",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
            },
            {
              "name": "OpenPKG-SA-2006.035",
              "refsource": "OPENPKG",
              "url": "http://www.openpkg.com/security/advisories/OpenPKG-SA-2006.035.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-6171",
    "datePublished": "2006-11-30T15:00:00",
    "dateReserved": "2006-11-30T00:00:00",
    "dateUpdated": "2024-08-07T20:19:34.625Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-5815 (GCVE-0-2006-5815)

Vulnerability from nvd – Published: 2006-11-08 23:00 – Updated: 2024-08-07 20:04
VLAI?
Summary
Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a "ProFTPD remote exploit."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2006/4451 vdb-entryx_refsource_VUPEN
http://gleg.net/vulndisco_meta.shtml x_refsource_MISC
http://www.debian.org/security/2006/dsa-1222 vendor-advisoryx_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://secunia.com/advisories/23207 third-party-advisoryx_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www.trustix.org/errata/2006/0066/ vendor-advisoryx_refsource_TRUSTIX
http://www.securityfocus.com/archive/1/452760/100… mailing-listx_refsource_BUGTRAQ
http://securitytracker.com/id?1017167 vdb-entryx_refsource_SECTRACK
http://www.openpkg.org/security/advisories/OpenPK… vendor-advisoryx_refsource_OPENPKG
http://secunia.com/advisories/23174 third-party-advisoryx_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.trustix.org/errata/2006/0070 vendor-advisoryx_refsource_TRUSTIX
http://secunia.com/advisories/23069 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23000 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/bugzilla/show_bug.cgi… x_refsource_CONFIRM
http://secunia.com/advisories/22821 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23184 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/23125 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/20992 vdb-entryx_refsource_BID
http://bugs.proftpd.org/show_bug.cgi?id=2858 x_refsource_CONFIRM
http://secunia.com/advisories/23179 third-party-advisoryx_refsource_SECUNIA
http://www.gentoo.org/security/en/glsa/glsa-20061… vendor-advisoryx_refsource_GENTOO
http://secunia.com/advisories/22803 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:04:55.597Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-4451",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/4451"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://gleg.net/vulndisco_meta.shtml"
          },
          {
            "name": "DSA-1222",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1222"
          },
          {
            "name": "MDKSA-2006:217",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217"
          },
          {
            "name": "23207",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23207"
          },
          {
            "name": "SSA:2006-335-02",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
          },
          {
            "name": "2006-0066",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0066/"
          },
          {
            "name": "20061127 CVE-2006-5815: remote code execution in ProFTPD",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/452760/100/200/threaded"
          },
          {
            "name": "1017167",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1017167"
          },
          {
            "name": "OpenPKG-SA-2006.035",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html"
          },
          {
            "name": "23174",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23174"
          },
          {
            "name": "MDKSA-2006:217-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
          },
          {
            "name": "proftpd-code-execution(30147)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30147"
          },
          {
            "name": "2006-0070",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2006/0070"
          },
          {
            "name": "23069",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23069"
          },
          {
            "name": "23000",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23000"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
          },
          {
            "name": "22821",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22821"
          },
          {
            "name": "23184",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23184"
          },
          {
            "name": "23125",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23125"
          },
          {
            "name": "20992",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/20992"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.proftpd.org/show_bug.cgi?id=2858"
          },
          {
            "name": "23179",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/23179"
          },
          {
            "name": "GLSA-200611-26",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
          },
          {
            "name": "22803",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22803"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-11-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a \"ProFTPD remote exploit.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-17T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-4451",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/4451"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://gleg.net/vulndisco_meta.shtml"
        },
        {
          "name": "DSA-1222",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1222"
        },
        {
          "name": "MDKSA-2006:217",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217"
        },
        {
          "name": "23207",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23207"
        },
        {
          "name": "SSA:2006-335-02",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
        },
        {
          "name": "2006-0066",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0066/"
        },
        {
          "name": "20061127 CVE-2006-5815: remote code execution in ProFTPD",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/452760/100/200/threaded"
        },
        {
          "name": "1017167",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1017167"
        },
        {
          "name": "OpenPKG-SA-2006.035",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html"
        },
        {
          "name": "23174",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23174"
        },
        {
          "name": "MDKSA-2006:217-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
        },
        {
          "name": "proftpd-code-execution(30147)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30147"
        },
        {
          "name": "2006-0070",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2006/0070"
        },
        {
          "name": "23069",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23069"
        },
        {
          "name": "23000",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23000"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
        },
        {
          "name": "22821",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22821"
        },
        {
          "name": "23184",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23184"
        },
        {
          "name": "23125",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23125"
        },
        {
          "name": "20992",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/20992"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.proftpd.org/show_bug.cgi?id=2858"
        },
        {
          "name": "23179",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/23179"
        },
        {
          "name": "GLSA-200611-26",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
        },
        {
          "name": "22803",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22803"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-5815",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the sreplace function in ProFTPD 1.3.0 and earlier allows remote attackers, probably authenticated, to cause a denial of service and execute arbitrary code, as demonstrated by vd_proftpd.pm, a \"ProFTPD remote exploit.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-4451",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/4451"
            },
            {
              "name": "http://gleg.net/vulndisco_meta.shtml",
              "refsource": "MISC",
              "url": "http://gleg.net/vulndisco_meta.shtml"
            },
            {
              "name": "DSA-1222",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1222"
            },
            {
              "name": "MDKSA-2006:217",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217"
            },
            {
              "name": "23207",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23207"
            },
            {
              "name": "SSA:2006-335-02",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.502491"
            },
            {
              "name": "2006-0066",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0066/"
            },
            {
              "name": "20061127 CVE-2006-5815: remote code execution in ProFTPD",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/452760/100/200/threaded"
            },
            {
              "name": "1017167",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1017167"
            },
            {
              "name": "OpenPKG-SA-2006.035",
              "refsource": "OPENPKG",
              "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.035-proftpd.html"
            },
            {
              "name": "23174",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23174"
            },
            {
              "name": "MDKSA-2006:217-1",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:217-1"
            },
            {
              "name": "proftpd-code-execution(30147)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/30147"
            },
            {
              "name": "2006-0070",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2006/0070"
            },
            {
              "name": "23069",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23069"
            },
            {
              "name": "23000",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23000"
            },
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820",
              "refsource": "CONFIRM",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=214820"
            },
            {
              "name": "22821",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22821"
            },
            {
              "name": "23184",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23184"
            },
            {
              "name": "23125",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23125"
            },
            {
              "name": "20992",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/20992"
            },
            {
              "name": "http://bugs.proftpd.org/show_bug.cgi?id=2858",
              "refsource": "CONFIRM",
              "url": "http://bugs.proftpd.org/show_bug.cgi?id=2858"
            },
            {
              "name": "23179",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/23179"
            },
            {
              "name": "GLSA-200611-26",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200611-26.xml"
            },
            {
              "name": "22803",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22803"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-5815",
    "datePublished": "2006-11-08T23:00:00",
    "dateReserved": "2006-11-08T00:00:00",
    "dateUpdated": "2024-08-07T20:04:55.597Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-2390 (GCVE-0-2005-2390)

Vulnerability from nvd – Published: 2005-07-27 04:00 – Updated: 2024-08-07 22:22
VLAI?
Summary
Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=112604373503912&w=2 vendor-advisoryx_refsource_OPENPKG
http://www.securityfocus.com/bid/14381 vdb-entryx_refsource_BID
http://www.securityfocus.com/bid/14380 vdb-entryx_refsource_BID
http://www.debian.org/security/2005/dsa-795 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/16181 third-party-advisoryx_refsource_SECUNIA
http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2 x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T22:22:49.114Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "OpenPKG-SA-2005.020",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=112604373503912\u0026w=2"
          },
          {
            "name": "14381",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14381"
          },
          {
            "name": "14380",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/14380"
          },
          {
            "name": "DSA-795",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2005/dsa-795"
          },
          {
            "name": "16181",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/16181"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-07-26T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2016-10-17T13:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "OpenPKG-SA-2005.020",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=112604373503912\u0026w=2"
        },
        {
          "name": "14381",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14381"
        },
        {
          "name": "14380",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/14380"
        },
        {
          "name": "DSA-795",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2005/dsa-795"
        },
        {
          "name": "16181",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/16181"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-2390",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple format string vulnerabilities in ProFTPD before 1.3.0rc2 allow attackers to cause a denial of service or obtain sensitive information via (1) certain inputs to the shutdown message from ftpshut, or (2) the SQLShowInfo mod_sql directive."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "OpenPKG-SA-2005.020",
              "refsource": "OPENPKG",
              "url": "http://marc.info/?l=bugtraq\u0026m=112604373503912\u0026w=2"
            },
            {
              "name": "14381",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14381"
            },
            {
              "name": "14380",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/14380"
            },
            {
              "name": "DSA-795",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2005/dsa-795"
            },
            {
              "name": "16181",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/16181"
            },
            {
              "name": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2",
              "refsource": "CONFIRM",
              "url": "http://www.proftpd.org/docs/RELEASE_NOTES-1.3.0rc2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-2390",
    "datePublished": "2005-07-27T04:00:00",
    "dateReserved": "2005-07-27T00:00:00",
    "dateUpdated": "2024-08-07T22:22:49.114Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2001-1500 (GCVE-0-2001-1500)

Vulnerability from nvd – Published: 2005-06-21 04:00 – Updated: 2024-08-08 04:58
VLAI?
Summary
ProFTPD 1.2.2rc2, and possibly other versions, does not properly verify reverse-resolved hostnames by performing forward resolution, which allows remote attackers to bypass ACLs or cause an incorrect client hostname to be logged.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securityfocus.com/archive/1/212805 mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/bid/3310 vdb-entryx_refsource_BID
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRAKE
http://distro.conectiva.com.br/atualizacoes/?id=a… vendor-advisoryx_refsource_CONECTIVA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:58:11.664Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20010907 ProFTPd and reverse DNS",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/212805"
          },
          {
            "name": "3310",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/3310"
          },
          {
            "name": "MDKSA-2002:005",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:005"
          },
          {
            "name": "CLA-2002:450",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000450"
          },
          {
            "name": "proftpd-unresolved-hostname(7126)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7126"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2001-09-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ProFTPD 1.2.2rc2, and possibly other versions, does not properly verify reverse-resolved hostnames by performing forward resolution, which allows remote attackers to bypass ACLs or cause an incorrect client hostname to be logged."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-18T21:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20010907 ProFTPd and reverse DNS",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/212805"
        },
        {
          "name": "3310",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/3310"
        },
        {
          "name": "MDKSA-2002:005",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:005"
        },
        {
          "name": "CLA-2002:450",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000450"
        },
        {
          "name": "proftpd-unresolved-hostname(7126)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7126"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2001-1500",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ProFTPD 1.2.2rc2, and possibly other versions, does not properly verify reverse-resolved hostnames by performing forward resolution, which allows remote attackers to bypass ACLs or cause an incorrect client hostname to be logged."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20010907 ProFTPd and reverse DNS",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/212805"
            },
            {
              "name": "3310",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/3310"
            },
            {
              "name": "MDKSA-2002:005",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2002:005"
            },
            {
              "name": "CLA-2002:450",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000450"
            },
            {
              "name": "proftpd-unresolved-hostname(7126)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/7126"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2001-1500",
    "datePublished": "2005-06-21T04:00:00",
    "dateReserved": "2005-06-21T00:00:00",
    "dateUpdated": "2024-08-08T04:58:11.664Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}